Smuggle a file to a user's browser
☆20Apr 16, 2022Updated 3 years ago
Alternatives and similar repositories for HTMLSmuggler
Users that are interested in HTMLSmuggler are comparing it to the libraries listed below
Sorting:
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Artifact monitoring that ensures fairplay☆77Jan 29, 2025Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Simple tool to perform HTML Smuggling.☆67Aug 17, 2021Updated 4 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- Implant drop-in for EDR testing☆147Nov 15, 2023Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- ☆53Feb 4, 2025Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- A little tool to play with Outlook☆207Nov 11, 2021Updated 4 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- ☆125Jun 28, 2023Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Dec 19, 2025Updated 3 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago