tatanus / MailPillage
python code to connect to mail servers and pillage the data contained within
☆10Updated 9 years ago
Alternatives and similar repositories for MailPillage:
Users that are interested in MailPillage are comparing it to the libraries listed below
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- ☆24Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- ☆47Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- Search bing with python☆12Updated 10 years ago