☆190Feb 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for dorothy
Users that are interested in dorothy are comparing it to the libraries listed below
Sorting:
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Built-in Panther detection rules and policies☆439Updated this week
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- macOS Initial Access Payload Generator☆324Jan 10, 2024Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- ☆176Apr 22, 2023Updated 2 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- ☆99Feb 16, 2021Updated 5 years ago
- ☆2,510Updated this week
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Production-ready detection & response queries for osquery☆600Aug 13, 2025Updated 6 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 5 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆192Nov 18, 2024Updated last year
- Serverless honeytoken 🕵🏻♂ ️☆81Jan 10, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago