anak0ndah / HadesHunterLinks
This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engagements, I noticed that Microsoft Teams conversations often contain sensitive data that users share without thinking twice - passwords, API keys, connection strings, and more.
☆46Updated 2 weeks ago
Alternatives and similar repositories for HadesHunter
Users that are interested in HadesHunter are comparing it to the libraries listed below
Sorting:
- Speed up your pentest enumeration☆83Updated 3 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 9 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆316Updated 9 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆449Updated 2 months ago
- Assess the security of your Active Directory with few or all privileges.☆336Updated this week
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 10 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆349Updated 11 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆124Updated 3 weeks ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆143Updated 4 months ago
- Captures network traffic app made in Rust.☆75Updated last week
- GLPI vulnerabilities checking tool☆154Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆647Updated 2 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆295Updated 2 months ago
- Sploit -- All-in-one, AI-powered cybersecurity toolkit for web, network, and phishing tests. Modular, cross-platform, Docker-ready, wit…☆31Updated 4 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆322Updated 7 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆432Updated 2 months ago
- Cyber threat intelligence tool suite.☆42Updated 9 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆228Updated 3 months ago
- ☆39Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Updated 2 months ago
- A tool for mapping cyber crime☆233Updated 8 months ago
- ☆43Updated last month