5 tools and resources
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
An open-source penetration testing framework for social engineering with custom attack vectors.