highmeh / lure
Lure - User Recon Automation for GoPhish
☆158Updated last year
Related projects ⓘ
Alternatives and complementary repositories for lure
- Passive internal reconnaissance tool☆67Updated 2 years ago
- A Python script to collect campaign data from Gophish and generate a report☆180Updated 2 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆185Updated 4 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 5 months ago
- LinkedIn reconnaissance tool☆48Updated 2 years ago
- Microsoft External Attack Tool☆177Updated last year
- For all your network pentesting needs☆150Updated 4 months ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆231Updated this week
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 7 months ago
- Disposable and resilient red team infrastructure with Terraform☆253Updated 5 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆330Updated 5 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆118Updated 2 years ago
- Simple parser framework.☆24Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- Rapid Attack Infrastructure (RAI)☆297Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆141Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆98Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- ☆147Updated last year
- ☆51Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆201Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆62Updated 2 years ago
- DeepSea Phishing Gear☆117Updated 4 years ago
- locate and attack Lync/Skype for Business☆334Updated last month
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆245Updated 6 months ago
- Tool to identify routers on the local LAN and paths to the Internet☆61Updated 9 months ago
- An epic web shell☆84Updated 6 months ago
- Password Breach API Server☆79Updated last year
- Just a collection of pentest stuffs☆96Updated 4 years ago