blackhatethicalhacking / peasant
LinkedIn reconnaissance tool
☆11Updated 5 years ago
Alternatives and similar repositories for peasant:
Users that are interested in peasant are comparing it to the libraries listed below
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆12Updated 4 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆33Updated 2 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 5 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 5 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 5 years ago
- The New Hacking Framework☆18Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Shell and Pen-testing Tool☆16Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆24Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago