1d8 / MailJack
☆30Updated 4 years ago
Alternatives and similar repositories for MailJack:
Users that are interested in MailJack are comparing it to the libraries listed below
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Noob Penetration tester☆11Updated 11 months ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆14Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- ☆17Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- ☆47Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- ☆21Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago