tatanus / apt2Links
APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploitable issues and common attack paths.
☆66Updated 6 years ago
Alternatives and similar repositories for apt2
Users that are interested in apt2 are comparing it to the libraries listed below
Sorting:
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Automate Metasploit scanning and exploitation☆116Updated last month
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Web Recon & Exploitation Tool.☆56Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆156Updated 4 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Enumerate a target Based off of Nmap Results☆79Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated last year
- ☆33Updated 7 months ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- automated password spraying tool☆147Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- HOCXSS (Cross Site Scripting)☆12Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 3 weeks ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Various scripts and codes☆84Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆19Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago