☆47Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for TeamsBreaker
Users that are interested in TeamsBreaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- ☆124Oct 9, 2023Updated 2 years ago
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆397Apr 3, 2024Updated 2 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆621Apr 2, 2026Updated last week
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆408Sep 26, 2024Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆243Aug 25, 2024Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- ☆160Apr 17, 2024Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Determine if the WebClient Service (WebDAV) is running on a remote system☆144Mar 9, 2024Updated 2 years ago
- ☆29May 10, 2024Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆32Sep 23, 2022Updated 3 years ago
- Living Off the Foreign Land setup scripts☆75Feb 26, 2025Updated last year
- ☆21Mar 19, 2026Updated 3 weeks ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- adws enumeration bof☆170Feb 16, 2026Updated last month
- Library of BOFs to interact with SQL servers☆231Dec 3, 2025Updated 4 months ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utils