KINGSABRI / creds-harvester
A simple, yet highly customizable, script to use with cloned websites for phishing and credentials harvesting
☆15Updated 2 years ago
Related projects: ⓘ
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- ☆10Updated this week
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Recon-ng modules for basic OSINT.☆9Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆18Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆44Updated 3 years ago
- ☆18Updated this week
- Obtain and parse SSL certificates☆9Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- ☆18Updated this week
- Advisories and Proofs of Concept by BlackArrow☆17Updated 5 months ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 7 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- A collection of personal ZAP scripts☆13Updated last year
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Password spraying toolkit☆7Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆12Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆17Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago