mlcsec / huntsman
Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io
☆78Updated 5 months ago
Alternatives and similar repositories for huntsman:
Users that are interested in huntsman are comparing it to the libraries listed below
- Living Off Security Tools☆43Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆140Updated last month
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆65Updated this week
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆110Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆146Updated this week
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆161Updated 3 months ago
- ☆53Updated last year
- Dredging up secrets from the depths of the file system☆118Updated 2 months ago
- Protection against HTML smuggling attempts.☆85Updated last week
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆31Updated 2 weeks ago
- This is an AD pentest tools collection☆53Updated 6 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆73Updated last month
- Discovering Typo Squatting on your domains!☆64Updated 6 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆98Updated 2 months ago
- ☆78Updated 9 months ago
- Hijack a slack bot to phish your way in☆43Updated last month
- Workshop & Talk Slide Decks from HackSpaceCon☆24Updated 8 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 3 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆46Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆105Updated 5 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆88Updated 11 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆33Updated last week
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last month