it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page
☆116Jul 18, 2023Updated 2 years ago
Alternatives and similar repositories for HtmlSmuggling
Users that are interested in HtmlSmuggling are comparing it to the libraries listed below
Sorting:
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 3 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆21Feb 10, 2026Updated 2 weeks ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆180Feb 27, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 3 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆498Jul 27, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Jan 7, 2024Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 8 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago