1d8 / MailJack
☆30Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for MailJack
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Noob Penetration tester☆10Updated 6 months ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- ☆50Updated 4 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆18Updated 5 years ago
- Simple C2 over the Trello API☆37Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- material for exploit development☆16Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- ☆16Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A web shell for pivoting and lateral movement☆31Updated 6 years ago
- Methods of C2☆21Updated 9 years ago