evilsocket / legba-cookbook
Legba recipes.
☆37Updated 3 weeks ago
Related projects: ⓘ
- Visualize BBOT scans in realtime with VivaGraphJS☆20Updated last week
- The Network Execution Tool☆12Updated 5 months ago
- ☆28Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆29Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated 2 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- ☆34Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- ☆15Updated 2 months ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- AutoPoC Generator HoneyPoC☆32Updated 2 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- hiding in plain sight: part 2☆40Updated 2 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- CVE-2013-4786 Go exploitation tool☆36Updated 10 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆27Updated 11 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 9 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 3 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 2 months ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago