6point6 / dmarc_checker
A DMARC scanning and parsing tool.
☆29Updated 3 years ago
Related projects: ⓘ
- ☆46Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆95Updated last year
- ☆40Updated last year
- ☆23Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆32Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆33Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- A proof of concept email spoofing tool built on Docker.☆112Updated 3 years ago
- ☆50Updated 7 months ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆17Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆15Updated 8 months ago
- ☆30Updated this week
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 2 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆74Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- ☆50Updated 5 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 9 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆16Updated last year
- ☆50Updated 11 months ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆55Updated 2 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year