MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdomain. The extensions UI popup highlights any misconfigurations in red and links to the supporting documentation.
☆88Sep 2, 2025Updated 6 months ago
Alternatives and similar repositories for MailFail
Users that are interested in MailFail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆216Dec 17, 2025Updated 3 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 9 months ago
- ☆27Mar 6, 2025Updated last year
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Parses Snaffler output file and generate beautified outputs.☆137Jan 4, 2026Updated 2 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 3 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- A DMARC scanning and parsing tool.☆33Apr 8, 2025Updated 11 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- ☆244May 5, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆265Nov 22, 2025Updated 4 months ago
- ☆234Jun 10, 2025Updated 9 months ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- A library for interacting with Windows through SMB written in Nim.☆17Sep 14, 2025Updated 6 months ago
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 5 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago