poppopretn / Stitcher
A tool designed to correlate evidence obtained from IoT devices
☆11Updated 4 years ago
Alternatives and similar repositories for Stitcher:
Users that are interested in Stitcher are comparing it to the libraries listed below
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- ☆54Updated 4 years ago
- ☆66Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆46Updated 2 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Passive Security Tools Fingerprinting Framework☆72Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- A tool to password spray Jenkins instances☆55Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆84Updated 2 years ago
- ☆19Updated 4 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- ☆19Updated 3 years ago