☆14Jul 9, 2024Updated last year
Alternatives and similar repositories for MPT
Users that are interested in MPT are comparing it to the libraries listed below
Sorting:
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Oct 8, 2024Updated last year
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- From Patch to PoC☆30Nov 19, 2025Updated 3 months ago
- Framework for modeling and researching C2 communications for developing efficient filtering and detection logic☆23Oct 24, 2024Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Bluetooth Landscape Exploration & Enumeration Platform☆53Dec 31, 2025Updated 2 months ago
- Coming soon...☆24Aug 16, 2023Updated 2 years ago
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- ☆10Updated this week
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- Damn Vulnerable SCA Application☆42Feb 13, 2026Updated 2 weeks ago
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- ☆39Sep 18, 2023Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A slightly more fun way to disable windows defender☆52May 4, 2025Updated 10 months ago
- ☆40Nov 29, 2024Updated last year
- A program to map out SPF and DKIM records for a large number of domains☆39Apr 1, 2015Updated 10 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- This repo includes the artifacts for the NDSS 2025 paper "Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China": h…☆52Mar 6, 2025Updated 11 months ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- ☆10May 12, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year