Gophish Python cli to perform huge phishing campaigns
☆39Oct 19, 2018Updated 7 years ago
Alternatives and similar repositories for gophish-cli
Users that are interested in gophish-cli are comparing it to the libraries listed below
Sorting:
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated 2 weeks ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Jan 8, 2018Updated 8 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Jun 14, 2020Updated 5 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- C# web scraper which targets chaturbate.com☆12Sep 14, 2018Updated 7 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- ☆152Jan 6, 2023Updated 3 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago