gophish / webhookLinks
A simple webhook server
☆12Updated 4 years ago
Alternatives and similar repositories for webhook
Users that are interested in webhook are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- URL fingerprinting made easy☆89Updated last year
- ☆33Updated 9 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- ☆53Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated last month
- Bug Bounty Monitor☆14Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Kraker is a distributed password brute-force system that focused on easy use.☆82Updated 4 months ago
- Protocol agnostic online password guessing API.☆84Updated 2 years ago
- Generate users list using certain format☆23Updated 6 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆69Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- automated password spraying tool☆147Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year