ninoseki / apulloLinks
A scanner for taking basic fingerprints
☆50Updated 5 years ago
Alternatives and similar repositories for apullo
Users that are interested in apullo are comparing it to the libraries listed below
Sorting:
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- discover IP ranges. check email security. survey domains.☆40Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ☆128Updated 2 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 7 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- ☆99Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆80Updated last month
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 3 years ago
- An Insider Threat Toolkit☆155Updated 7 years ago
- A web shell for pivoting and lateral movement☆33Updated 8 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- ☆54Updated 4 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Updated 2 years ago
- Machine Learning Network Share Password Hunting Toolkit☆129Updated 5 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago