MattKeeley / SpoofyLinks
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
☆703Updated 8 months ago
Alternatives and similar repositories for Spoofy
Users that are interested in Spoofy are comparing it to the libraries listed below
Sorting:
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,033Updated 7 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆336Updated 3 months ago
- Compiled tools for internal assessments☆327Updated this week
- ☆496Updated 2 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆515Updated last month
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,126Updated 3 months ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆878Updated 7 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆577Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆763Updated last year
- A RedTeam Toolkit☆400Updated 2 months ago
- ☆774Updated this week
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆695Updated 2 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,222Updated 2 months ago
- Azure JWT Token Manipulation Toolset☆670Updated 6 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,199Updated last week
- a tool to help operate in EDRs' blind spots☆738Updated 6 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆421Updated 5 months ago
- ☆718Updated last month
- Script for generating revshells☆472Updated 9 months ago
- ☆490Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,129Updated 7 months ago
- Azure Data Exporter for BloodHound☆719Updated last week
- Pentest Report Generator☆410Updated 2 weeks ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆574Updated 2 years ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆748Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago