ytisf / apateLinks
Your Friendly Neighbourhood Honeypot Maker and Manager
☆33Updated 6 years ago
Alternatives and similar repositories for apate
Users that are interested in apate are comparing it to the libraries listed below
Sorting:
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Rogue AP killer☆90Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Short little AV Test to check Detection Rates☆22Updated 4 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Get email notification when Virus Total has a copy of your binary.☆166Updated 5 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 10 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 2 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆83Updated 7 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 7 years ago
- scythe: account enumerator☆61Updated 12 years ago
- The User Interface for GoCrack☆88Updated 3 weeks ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Truehunter☆31Updated 4 years ago
- ☆82Updated last year
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 7 years ago