This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engagements, I noticed that Microsoft Teams conversations often contain sensitive data that users share without thinking twice - passwords, API keys, connection strings, and more.
☆56Dec 21, 2025Updated 3 months ago
Alternatives and similar repositories for HadesHunter
Users that are interested in HadesHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 7 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- ☆22Feb 17, 2026Updated 2 months ago
- Modern Web Dashboard for Rclone☆73Apr 10, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ce descriptif couvre : 🏗️ Infrastructure : Terraform + GCP 🔒 Sécurité : VPC privé 🌐 Réseau : Gateway GCP, firewall 🎯 Composants : Obs…☆38Oct 21, 2025Updated 5 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Updated this week
- App built to remind users about media they requested but never watched. Requires Plex, Tautulli and Overseerr.☆34Jan 18, 2026Updated 3 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated 3 weeks ago
- ☆13Jan 5, 2026Updated 3 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- ☆39Feb 27, 2026Updated last month
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Dec 15, 2024Updated last year
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆32Feb 4, 2026Updated 2 months ago
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- ☆33Apr 22, 2025Updated 11 months ago
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated last month
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Comprehensive, categorized domain blocklists for web filtering on firewalls like pfSense, OPNsense, FortiGate, MikroTik, Sophos, Untangle…☆18Sep 3, 2025Updated 7 months ago
- ☆11Jan 26, 2026Updated 2 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- ☆17Feb 25, 2026Updated last month
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- ☆84Feb 12, 2026Updated 2 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Open-Source CLI Penetration Testing Tool To Automate Various Processes☆52Jun 18, 2024Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆161Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆420Feb 13, 2026Updated 2 months ago
- ☆18Jan 3, 2016Updated 10 years ago
- ☆36Feb 5, 2026Updated 2 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 2 months ago
- Miscellaneous Azure Sentinel files that don't fall into other categories.☆13Aug 23, 2021Updated 4 years ago
- A minimalist dotfiles manager using Nix☆21May 28, 2025Updated 10 months ago