jenyraval / MPT
☆14Updated 2 months ago
Related projects: ⓘ
- ☆15Updated 2 months ago
- AWS Testing and Reporting Management Tool☆20Updated last year
- A simple way to exfiltrate data using spotify API☆17Updated 2 weeks ago
- OAuth 2.0 exploitation, attack and research tools.☆10Updated 8 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated 3 months ago
- ☆16Updated this week
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆23Updated 5 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- ☆14Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year
- Can you pay the ransom in your country?☆13Updated 9 months ago
- Stupid Simple Detection Testing☆11Updated 6 months ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆11Updated last month
- A user enumeration tool for Slack.☆19Updated 3 months ago
- Convert Nmap output for integration with other Project Discovery tools☆14Updated last year
- Provides an overview of the inner file structure of a PDF☆24Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- wordlists for password cracking☆25Updated 2 years ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆9Updated last month
- ☆17Updated last year
- details about DIAL protocol vulnerabilities☆27Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Silver SAML forgery tool☆41Updated 6 months ago
- ☆18Updated 6 months ago
- ☆16Updated 6 months ago