cyllective / malfluenceLinks
A PoC for a malicious Confluence plugin.
☆16Updated last year
Alternatives and similar repositories for malfluence
Users that are interested in malfluence are comparing it to the libraries listed below
Sorting:
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Updated 10 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆76Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 6 months ago
- SOAPI - The OpenAPI Documentation Scanner☆39Updated 11 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Updated 11 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆49Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated last year
- ☆18Updated last year
- A Moodle Scanner☆43Updated last year
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 8 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Updated last year
- Repo for all my exploits/PoCs☆51Updated 9 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year