D00Movenok / HTMLSmuggler
✉️ HTML Smuggling generator&obfuscator for your Red Team operations
☆162Updated last year
Alternatives and similar repositories for HTMLSmuggler
Users that are interested in HTMLSmuggler are comparing it to the libraries listed below
Sorting:
- Continuous password spraying tool☆183Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- ☆157Updated last year
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆93Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated last year
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆246Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- Our Tips&Tricks☆117Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- ☆85Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆186Updated 2 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆202Updated 4 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- ☆103Updated 8 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 3 months ago
- PDF dropper Red Team Scenairos☆207Updated 9 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- Chrome browser extension-based Command & Control☆134Updated 2 months ago
- A collection of Cobalt Strike Aggressor scripts.☆96Updated 3 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆197Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- PowerShell Obfuscator☆174Updated 11 months ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 7 months ago