Stars
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Arsenal is just a quick inventory and launcher for hacking programs
A powerful and useful hacker dictionary builder for a brute-force attack
LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Enumerate the permissions associated with AWS credential set
smbclient-ng, a fast and user friendly way to interact with SMB shares.
Subdomain and target enumeration tool built for offensive security testing
Python version of the C# tool for "Shadow Credentials" attacks
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, software/version numbers and naming conventions.
Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the known threat actors.
CVE-2019-9978 - (PoC) RCE in Social WarFare Plugin (<=3.5.2)
Breathe life into your Telegram chat with /b-level content