A tool to assist in the development of landing pages for phishing campaigns
☆15Oct 3, 2022Updated 3 years ago
Alternatives and similar repositories for Sinker
Users that are interested in Sinker are comparing it to the libraries listed below
Sorting:
- XSS (Cross Site Scripting) attack is performed on a website of Bank Management System using Kali Linux and Burp Suite☆10Aug 25, 2021Updated 4 years ago
- ☆10Jun 15, 2021Updated 4 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- An online Marketplace for Graduates, Undergraduates and Postgraduates which serves as a common platform to sell and buy.☆12Apr 30, 2024Updated last year
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- a NPM module to cache any given function / class using a single line.☆14Aug 10, 2021Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- Creates an rouge AP and phishes credentials☆10Dec 29, 2019Updated 6 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Web Reconnaissance and Analyst☆20Jul 12, 2022Updated 3 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆13Nov 4, 2018Updated 7 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- ☆18Sep 24, 2024Updated last year
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Jul 10, 2024Updated last year
- ☆12Feb 8, 2018Updated 8 years ago
- ☆10Updated this week
- ☆17Oct 16, 2020Updated 5 years ago
- This project is Malware detection API using ML and CNN techniques☆25Apr 29, 2023Updated 2 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- ansible fqcn converter: auto-convert your ansible playbooks / roles / tasks etc. to use fqcn notation☆25Dec 3, 2025Updated 3 months ago
- Self-hosted Information Security Management System — ISO 27001, NIS2, GDPR/DSGVO, BSI IT-Grundschutz☆77Updated this week
- ☆38Mar 28, 2025Updated 11 months ago
- In this repo I will upload aggregated resources I get from my daily reading of academic papers.☆13Mar 14, 2026Updated last week
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago