HunnicCyber / Phishing-With-Netlify
Phishing sites configured to work with Netlify form handling
☆12Updated 5 years ago
Alternatives and similar repositories for Phishing-With-Netlify:
Users that are interested in Phishing-With-Netlify are comparing it to the libraries listed below
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Event Data Collector☆36Updated 8 months ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- parsers to make life easier☆12Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 months ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆17Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- ☆13Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago