elcuervo / tangalangaView external linksLinks
Tangalanga: the Zoom conference scanner hacking tool
☆287Oct 20, 2020Updated 5 years ago
Alternatives and similar repositories for tangalanga
Users that are interested in tangalanga are comparing it to the libraries listed below
Sorting:
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆152Jun 25, 2020Updated 5 years ago
- A network scanner tool, developed in Python 3 using scapy.☆136Oct 24, 2020Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆291May 2, 2024Updated last year
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Web Application Vulnerability Scanner☆132Sep 25, 2020Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- A toolkit to attack Office365☆1,115Nov 6, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Red Team PowerShell Script☆335Jul 31, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Web-based check for Windows privesc vulnerabilities☆140May 14, 2023Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Mar 27, 2022Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- XSHOCK Shellshock Exploit☆89Dec 8, 2022Updated 3 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.☆161Jun 30, 2023Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- A backdoor with a multitude of features.☆291Oct 3, 2024Updated last year