grahamhelton / spoofpoint
Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelton.com turns into -> grahamheIton.com ((The L is a capital I )), check a list of domains you already have, or check as single domain.
☆41Updated last year
Alternatives and similar repositories for spoofpoint:
Users that are interested in spoofpoint are comparing it to the libraries listed below
- MayorSec DNS Enumeration Tool☆85Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- Is a tool written by using python programming language. Enable a penetration testers to save a time and performing a full Reconnaissance …☆44Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆43Updated 3 weeks ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆52Updated 3 weeks ago
- ☆34Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Next generation fireprox AWS API endpoint creation utility.☆49Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- A repository with informtion related to Cloud Osint☆88Updated 2 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆47Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆43Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- ☆33Updated 4 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- ☆22Updated 4 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago