ditmer / Drop-PiLinks
This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social engineering penetration test.
☆34Updated last year
Alternatives and similar repositories for Drop-Pi
Users that are interested in Drop-Pi are comparing it to the libraries listed below
Sorting:
- A simple Python script to do quick, targeted recon of a given domain.☆55Updated 7 months ago
- tool for identifying guest relationships between companies☆103Updated last year
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- DEFCON 31 slide deck and video link☆65Updated 5 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆86Updated 2 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆113Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆103Updated 2 years ago
- A public, open source physical security methodology☆46Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆135Updated 9 months ago
- The CAPTCHA-resilient contact scraper.☆34Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- ☆60Updated 2 years ago
- ☆105Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆40Updated 11 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆15Updated last year
- ☆117Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Script to perform some hashcracking logic automagically☆78Updated last week
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆89Updated 3 months ago
- ☆36Updated last year
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆16Updated 3 years ago
- a map for the azure oriented pentests☆67Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- ☆99Updated 2 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago