blackhatethicalhacking / peasantLinks
LinkedIn reconnaissance tool
☆11Updated 5 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below
Sorting:
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- A toolkit to attack Office365☆16Updated 6 years ago
- ☆12Updated 4 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- ☆33Updated 7 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Let's obscure some IPv4 addresses☆37Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆66Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your …☆16Updated 4 years ago
- automated password spraying tool☆147Updated 4 years ago
- Automated Enumeration Script for Pentesting☆34Updated 5 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last month
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- ☆24Updated 5 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Shell and Pen-testing Tool☆16Updated 3 months ago
- ☆22Updated 8 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆30Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago