blackhatethicalhacking / peasant
LinkedIn reconnaissance tool
☆11Updated 5 years ago
Alternatives and similar repositories for peasant
Users that are interested in peasant are comparing it to the libraries listed below
Sorting:
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆12Updated 4 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A Tool for Domain Flyovers☆18Updated 5 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆33Updated 3 months ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Yet another open S3 bucket finder☆20Updated 7 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 5 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆19Updated 9 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago