Pwnspoof repository
☆265Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SMBeagle - Fileshare auditing tool.☆744Nov 4, 2025Updated 5 months ago
- Secret Magpie - Secret Detection Tool☆244Jul 10, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,203Oct 6, 2025Updated 6 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆352Oct 22, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆159Nov 26, 2023Updated 2 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆461Oct 30, 2022Updated 3 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,509Apr 1, 2026Updated last week
- ☆30Mar 23, 2026Updated 3 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,406Nov 7, 2024Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 3 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- ☆44Oct 11, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,270Apr 12, 2024Updated 2 years ago
- ☆27May 14, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24May 8, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,019Updated this week