MattKeeley / SpoofyLinks
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
☆724Updated last month
Alternatives and similar repositories for Spoofy
Users that are interested in Spoofy are comparing it to the libraries listed below
Sorting:
- Compiled tools for internal assessments☆362Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆668Updated last year
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆722Updated 2 months ago
- ☆573Updated last month
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆341Updated 7 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆561Updated 5 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,220Updated 7 months ago
- ☆806Updated 2 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆614Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆460Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,039Updated 11 months ago
- A RedTeam Toolkit☆407Updated 2 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,315Updated 6 months ago
- ☆434Updated last year
- Username enumeration and password spraying tool aimed at Microsoft O365.☆937Updated 11 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Identify privilege escalation paths within and across different clouds☆705Updated 2 months ago
- A python tool to automate KeePass discovery and secret extraction.☆502Updated 10 months ago
- An offensive data enrichment pipeline☆859Updated this week
- An open-source self-hosted purple team management web application.☆291Updated 2 weeks ago
- Pentest Report Generator☆431Updated this week
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆380Updated 3 weeks ago
- ☆746Updated 5 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,234Updated 2 months ago
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 8 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆851Updated 5 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆267Updated 5 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,243Updated 3 weeks ago
- Azure Data Exporter for BloodHound☆790Updated this week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆730Updated 2 years ago