gophish / webhookLinks
A simple webhook server
☆12Updated 4 years ago
Alternatives and similar repositories for webhook
Users that are interested in webhook are comparing it to the libraries listed below
Sorting:
- ☆42Updated 2 months ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- ☆33Updated 5 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- Tactics, Techniques, and Procedures☆25Updated 5 months ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆56Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 3 years ago
- backdoor that uses dns to communicate☆33Updated 3 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Notification webhook for GoPhish☆54Updated last year
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago