HunnicCyber / Phishing-With-Netlify
Phishing sites configured to work with Netlify form handling
☆12Updated 5 years ago
Alternatives and similar repositories for Phishing-With-Netlify:
Users that are interested in Phishing-With-Netlify are comparing it to the libraries listed below
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Event Data Collector☆36Updated 7 months ago
- ☆11Updated 4 years ago
- parsers to make life easier☆12Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 2 months ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆13Updated 3 years ago
- ☆14Updated 4 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 7 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago