HunnicCyber / Phishing-With-Netlify
Phishing sites configured to work with Netlify form handling
☆12Updated 5 years ago
Alternatives and similar repositories for Phishing-With-Netlify:
Users that are interested in Phishing-With-Netlify are comparing it to the libraries listed below
- SSDP Service Discovery☆16Updated 6 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Firebase Domain Front Code☆21Updated 3 years ago
- Event Data Collector☆36Updated 9 months ago
- parsers to make life easier☆12Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆13Updated 3 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- ☆12Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆14Updated 5 years ago
- ☆17Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 4 months ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Ansible role to deploy RedELK server☆18Updated last year