ditmer / Drop-PiLinks
This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
☆34Updated 10 months ago
Alternatives and similar repositories for Drop-Pi
Users that are interested in Drop-Pi are comparing it to the libraries listed below
Sorting:
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆81Updated 3 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆94Updated last year
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- tool for identifying guest relationships between companies☆101Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- A public, open source physical security methodology☆46Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆123Updated last month
- DEFCON 31 slide deck and video link☆64Updated 2 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆81Updated 3 months ago
- Script to perform some hashcracking logic automagically☆73Updated this week
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 7 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆133Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆179Updated last year
- Living Off Security Tools☆45Updated 10 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 3 months ago
- The CAPTCHA-resilient contact scraper.☆24Updated 11 months ago
- ☆37Updated 9 months ago
- ☆12Updated 10 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆25Updated 4 months ago
- ☆105Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- ☆95Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆92Updated 5 months ago