punk-security / pwnspoofView external linksLinks
Pwnspoof repository
☆264Sep 8, 2023Updated 2 years ago
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- SMBeagle - Fileshare auditing tool.☆744Nov 4, 2025Updated 3 months ago
- Secret Magpie - Secret Detection Tool☆246Jul 10, 2024Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Jun 13, 2023Updated 2 years ago
- ☆99Feb 16, 2021Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Jan 20, 2022Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Oct 22, 2024Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆211Nov 29, 2020Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆99Nov 10, 2021Updated 4 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆462Oct 30, 2022Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- ☆160Nov 26, 2023Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,194Oct 6, 2025Updated 4 months ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,400Nov 7, 2024Updated last year
- ☆27May 14, 2022Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24May 8, 2022Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,476Oct 8, 2022Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated last year
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated last year
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆998Updated this week