cyllective / malfluenceLinks
A PoC for a malicious Confluence plugin.
☆16Updated last year
Alternatives and similar repositories for malfluence
Users that are interested in malfluence are comparing it to the libraries listed below
Sorting:
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 5 months ago
- SOAPI - The OpenAPI Documentation Scanner☆37Updated 7 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 6 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 11 months ago
- ☆78Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆46Updated 8 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆50Updated 6 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆69Updated 3 weeks ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 5 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆26Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆25Updated 10 months ago
- Fast website scraper and wordlist generator☆81Updated 4 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- ☆55Updated 8 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 5 months ago
- Vast.ai Password Kracking☆86Updated 3 months ago