Telefonica / MetaThief
PoC for extracting office files into PDF file metadata
☆10Updated 5 years ago
Related projects: ⓘ
- Collaborative web dashboard for RedTeam pentesters☆21Updated 4 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 5 years ago
- A ping detection tool for linux☆23Updated 4 years ago
- ☆16Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- ☆17Updated this week
- Clean public password dump files and store in ELK☆35Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- ☆33Updated 6 years ago
- Convert Wigle.net result from json to Kml☆15Updated 3 years ago
- ☆12Updated this week
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆16Updated 5 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆20Updated 4 years ago
- ☆22Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Report and finding templates used by the Serpico reporting tool☆15Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- AutoDecoder tool for CTFs☆15Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated last year
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago