t94j0 / AIRMASTER
Use ExpiredDomains.net and BlueCoat to find useful domains for red team.
☆179Updated 2 years ago
Alternatives and similar repositories for AIRMASTER:
Users that are interested in AIRMASTER are comparing it to the libraries listed below
- Go-deliver is a payload delivery tool coded in Go.☆116Updated 6 years ago
- blacksheepwall is a hostname reconnaissance tool☆301Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- For all your network pentesting needs☆152Updated 9 months ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆232Updated 4 months ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆148Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- myBFF - a Brute Force Framework☆140Updated 3 weeks ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- PowerDNS: Powershell DNS Delivery☆211Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- locate and attack Lync/Skype for Business☆336Updated 5 months ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- ☆28Updated 2 years ago
- Snarf man-in-the-middle / relay suite☆203Updated 8 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- a CLI for ephemeral penetration testing☆12Updated 5 years ago
- ☆97Updated 6 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- A framework for stealthy domain reconnaissance☆301Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆102Updated 3 years ago
- A command line tool for creating malicious outlook rules☆161Updated 6 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago