MattKeeley / Spoofy
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
☆661Updated 4 months ago
Alternatives and similar repositories for Spoofy:
Users that are interested in Spoofy are comparing it to the libraries listed below
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆615Updated 8 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆320Updated 3 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆644Updated 2 months ago
- Pentest Report Generator☆394Updated this week
- A RedTeam Toolkit☆394Updated 3 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,011Updated 6 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆514Updated 3 months ago
- a tool to help operate in EDRs' blind spots☆705Updated 2 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆705Updated last year
- Azure JWT Token Manipulation Toolset☆633Updated 2 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,111Updated 3 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,101Updated 8 months ago
- An open-source self-hosted purple team management web application.☆255Updated last month
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆486Updated 2 years ago
- ☆236Updated 3 weeks ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆809Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆713Updated last year
- An offensive data enrichment pipeline☆660Updated 2 weeks ago
- ☆698Updated 2 weeks ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆401Updated 3 weeks ago
- Identify privilege escalation paths within and across different clouds☆680Updated 3 months ago
- ☆467Updated 9 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆652Updated 2 weeks ago
- Compiled tools for internal assessments☆266Updated this week
- Script for generating revshells☆461Updated 5 months ago
- Infrastructure Automation☆337Updated 10 months ago
- Azure Data Exporter for BloodHound☆631Updated this week
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆345Updated 2 years ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆412Updated 2 weeks ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆845Updated last week