SVG Analysis and generation tools for commonly seen SVG attachment phishing
☆56Sep 24, 2025Updated 7 months ago
Alternatives and similar repositories for svg_phishing_tools
Users that are interested in svg_phishing_tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆125Mar 27, 2026Updated last month
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- Execute shellcode via ASPNET compiler☆61Oct 2, 2025Updated 7 months ago
- One-header configurable C++20 COFF loader☆20Jul 21, 2025Updated 9 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆21Dec 3, 2024Updated last year
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆12May 13, 2024Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- ☆85Feb 12, 2026Updated 2 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆59Apr 10, 2026Updated 3 weeks ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆267Sep 23, 2025Updated 7 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆208Jul 18, 2025Updated 9 months ago
- ☆36Jan 23, 2025Updated last year
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆39Jan 2, 2025Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 4 months ago
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 8 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆170Nov 17, 2025Updated 5 months ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- ☆62Feb 12, 2026Updated 2 months ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆93May 24, 2025Updated 11 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- 一个调用 rustscan 进行端口扫描的 go 库☆22Dec 30, 2021Updated 4 years ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- Ghosting-AMSI☆18Apr 30, 2025Updated last year
- ☆48Dec 28, 2025Updated 4 months ago