t3l3machus / BabelStrikeLinks
The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written in multiple (non-English) languages, common problem occurring from scraped employee name lists (e.g. from Linkedin). 2. to transliterate a wordlist that may include words/phrases written in multiple (non-Englis
☆132Updated last year
Alternatives and similar repositories for BabelStrike
Users that are interested in BabelStrike are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆133Updated last year
- ☆25Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆109Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆179Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆65Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 4 months ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- ☆92Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated 11 months ago
- ☆102Updated last year
- ☆65Updated 2 years ago
- Azure Service Subdomain Enumeration☆66Updated 11 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago