MattKeeley / SpoofyLinks
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
☆714Updated last month
Alternatives and similar repositories for Spoofy
Users that are interested in Spoofy are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆657Updated last year
- Compiled tools for internal assessments☆357Updated last week
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆710Updated last month
- A RedTeam Toolkit☆407Updated last month
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆550Updated 4 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆339Updated 6 months ago
- ☆540Updated 2 weeks ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,037Updated 10 months ago
- An offensive data enrichment pipeline☆840Updated last week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,191Updated 5 months ago
- ☆804Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆596Updated 10 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆460Updated last year
- Username enumeration and password spraying tool aimed at Microsoft O365.☆918Updated 10 months ago
- ☆433Updated last year
- Pentest Report Generator☆427Updated 3 weeks ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆407Updated 6 months ago
- An open-source self-hosted purple team management web application.☆287Updated 3 weeks ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆429Updated 7 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆314Updated last year
- Azure Data Exporter for BloodHound☆764Updated last week
- ☆740Updated 4 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆827Updated 4 months ago
- a tool to help operate in EDRs' blind spots☆757Updated 9 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆377Updated 3 weeks ago
- Red Team Attack Lab for TTP testing & research☆578Updated 2 years ago
- Active Directory Auditing and Enumeration☆475Updated 2 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆431Updated 5 months ago
- Script for generating revshells☆476Updated last year