blackhatethicalhacking / peasant
LinkedIn reconnaissance tool
☆11Updated 5 years ago
Alternatives and similar repositories for peasant:
Users that are interested in peasant are comparing it to the libraries listed below
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆12Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- ☆19Updated 9 years ago
- ☆33Updated 3 months ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- ☆20Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- ☆30Updated 6 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Yet another open S3 bucket finder☆20Updated 7 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago