HunnicCyber / Phishing-With-Netlify
Phishing sites configured to work with Netlify form handling
☆12Updated 5 years ago
Alternatives and similar repositories for Phishing-With-Netlify:
Users that are interested in Phishing-With-Netlify are comparing it to the libraries listed below
- Some Pentesting Scripts☆10Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Obtain and parse SSL certificates☆9Updated 2 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- Event Data Collector☆36Updated 6 months ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆11Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Ansible role that Installs Mythic☆14Updated 6 months ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- ☆11Updated 5 years ago
- parsers to make life easier☆12Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆12Updated last month
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 3 weeks ago
- SSDP Service Discovery☆16Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- ☆13Updated 3 years ago