blackhatethicalhacking / Veil
Veil 3.1.X (Check version info in Veil at runtime)
☆14Updated 5 years ago
Alternatives and similar repositories for Veil:
Users that are interested in Veil are comparing it to the libraries listed below
- A tool to abuse Exchange services☆18Updated 5 years ago
- The New Hacking Framework☆18Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- ☆34Updated 6 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 3 years ago
- LinkedIn reconnaissance tool☆11Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- ☆12Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆78Updated 3 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago