mrcbax / ActiveAntiPhish
Saturate the bad guys' databases.
☆14Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for ActiveAntiPhish
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆14Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆49Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆28Updated 10 months ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Plugins for the Serpico Project☆22Updated 5 years ago
- ☆25Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆73Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- first commit☆20Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Intelligent threat hunter and phishing servers☆46Updated 5 years ago