carnal0wnage / malicious_file_maker
malicious file maker/sender to create and send malicious attachments to test your email filter/alerting
☆67Updated 6 years ago
Related projects: ⓘ
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆48Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 3 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 4 months ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 6 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 5 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 7 years ago
- Easy Window domain access☆50Updated 10 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- ☆59Updated 5 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 7 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- WhiteBox CMS analysis☆68Updated last year
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 7 years ago
- ☆25Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- Subdomain brute force focused on speed and data serialization☆73Updated last year
- Analysis of wifi probe request data☆11Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- ☆73Updated this week
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- ☆57Updated this week
- ☆24Updated this week
- Common Findings Database☆100Updated 5 years ago
- ☆51Updated 8 years ago