This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engagements, I noticed that Microsoft Teams conversations often contain sensitive data that users share without thinking twice - passwords, API keys, connection strings, and more.
☆56Dec 21, 2025Updated 3 months ago
Alternatives and similar repositories for HadesHunter
Users that are interested in HadesHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆32Aug 29, 2025Updated 7 months ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- ☆22Feb 17, 2026Updated last month
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- ☆24Mar 22, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Ce descriptif couvre : 🏗️ Infrastructure : Terraform + GCP 🔒 Sécurité : VPC privé 🌐 Réseau : Gateway GCP, firewall 🎯 Composants : Obs…☆38Oct 21, 2025Updated 5 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated 2 months ago
- Plataforma de CTI Assíncrona focada em Crimes Financeiros (Pix/Cripto) e Compliance Regulatório (Lei 14.790). Powered by LangGraph & Asyn…☆40Jan 14, 2026Updated 2 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆24Mar 19, 2026Updated last week
- ☆13Jan 5, 2026Updated 2 months ago
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆30Feb 4, 2026Updated last month
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- A collection of scripts and tools for managing ADFS☆14Aug 6, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Dec 15, 2024Updated last year
- An advanced, ultra-lightweight firewall orchestrator for Linux. SysWarden integrates Data-Shield IPv4 blocklists, Geo-Blocking, Spamhaus …☆93Updated this week
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated last month
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- ☆33Apr 22, 2025Updated 11 months ago
- A Opensource and self hosted alternative of Grammarly☆84Updated this week
- Powershell Script to enumerate AzureAD and output good data☆14Nov 8, 2023Updated 2 years ago
- ☆95Jul 17, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated 2 weeks ago
- ☆11Jan 26, 2026Updated 2 months ago
- Comprehensive, categorized domain blocklists for web filtering on firewalls like pfSense, OPNsense, FortiGate, MikroTik, Sophos, Untangle…☆17Sep 3, 2025Updated 6 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Run TTPs, with AI!☆122Feb 23, 2026Updated last month
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- Power BI templates for Exchange Online Protection and Office 365 Advanced Threat Protection reporting☆13Sep 9, 2020Updated 5 years ago
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- ☆80Feb 12, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆17Feb 25, 2026Updated last month
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 5 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆158Dec 2, 2025Updated 3 months ago
- Open-Source CLI Penetration Testing Tool To Automate Various Processes☆52Jun 18, 2024Updated last year
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆423Feb 13, 2026Updated last month
- ☆18Jan 3, 2016Updated 10 years ago