ditmer / Drop-PiLinks
This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
☆35Updated last year
Alternatives and similar repositories for Drop-Pi
Users that are interested in Drop-Pi are comparing it to the libraries listed below
Sorting:
- A simple Python script to do quick, targeted recon of a given domain.☆68Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 5 months ago
- The CAPTCHA-resilient contact scraper.☆45Updated 2 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆115Updated last year
- DEFCON 31 slide deck and video link☆66Updated 8 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- Living Off Security Tools☆58Updated 2 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- tool for identifying guest relationships between companies☆102Updated last year
- ☆42Updated last year
- ☆53Updated last year
- A public, open source physical security methodology☆47Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- ☆76Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- A user enumeration tool for Slack.☆35Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Updated 10 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- ☆12Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- ☆43Updated last year
- ☆102Updated 4 months ago
- Azure Service Subdomain Enumeration☆71Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- MCP server for Atomic Red Team☆105Updated last week
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- Easy red team phishing with Puppeteer☆133Updated 3 years ago