t3l3machus / BabelStrikeView external linksLinks
The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in multiple (non-English) languages, common problem occurring from scraped employee name lists (e.g. from Linkedin). 2. to transliterate a wordlist that may include words/phrases written in multiple (non-Englis
☆138Jul 19, 2024Updated last year
Alternatives and similar repositories for BabelStrike
Users that are interested in BabelStrike are comparing it to the libraries listed below
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,407Jun 8, 2025Updated 8 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆27Jul 19, 2024Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Jul 19, 2024Updated last year
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆409Jan 19, 2025Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Jul 19, 2024Updated last year
- ☆26Jun 24, 2025Updated 7 months ago
- OWASP based Web Application Security Testing Checklist☆84Jul 19, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 10 months ago
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- All-sources tool to search websites by favicons☆184Nov 9, 2024Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,415Jan 19, 2025Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Jul 16, 2021Updated 4 years ago
- A tool for extracting additional data from a person's personal identifiers☆43Nov 14, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆565Jun 5, 2023Updated 2 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆53Oct 19, 2023Updated 2 years ago
- Your template-based BloodHound terminal companion tool☆446Jan 21, 2026Updated 3 weeks ago
- ☆567Mar 28, 2024Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆386Apr 16, 2022Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Dec 18, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,105Jun 19, 2024Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆222May 2, 2025Updated 9 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated last year
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,136Jul 19, 2024Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- ☆715Mar 22, 2024Updated last year