ditmer / Drop-PiLinks
This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
☆33Updated 10 months ago
Alternatives and similar repositories for Drop-Pi
Users that are interested in Drop-Pi are comparing it to the libraries listed below
Sorting:
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- tool for identifying guest relationships between companies☆101Updated last year
- ☆105Updated last year
- A public, open source physical security methodology☆46Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 9 months ago
- A safe place to hide all your precious data at.☆24Updated 5 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆14Updated 10 months ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- ☆36Updated 8 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆17Updated 3 months ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated 2 weeks ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆202Updated 2 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆80Updated 2 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆177Updated last year
- Neuviks Terraform Red Team Workshop☆13Updated 7 months ago