Creates and sends fake meeting invite
☆74Apr 24, 2021Updated 4 years ago
Alternatives and similar repositories for fakemeeting
Users that are interested in fakemeeting are comparing it to the libraries listed below
Sorting:
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 4 years ago
- Payload Generation Framework☆21Oct 24, 2024Updated last year
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Jun 14, 2021Updated 4 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- The following package is the standalone wordlist-only component to flask-unsign.☆43Jun 15, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆607Dec 9, 2025Updated 2 months ago
- Python script for carving Bitlocker VMK keys☆25Feb 4, 2026Updated 3 weeks ago
- ☆12Dec 3, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆12Oct 10, 2024Updated last year
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A repo to house files for our blogposts on blog.nviso.eu☆76Mar 13, 2025Updated 11 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- ☆26Feb 6, 2026Updated 3 weeks ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆46Jan 18, 2021Updated 5 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- ☆70Apr 21, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago