N1ckDunn / DataBouncing
☆37Updated 10 months ago
Alternatives and similar repositories for DataBouncing:
Users that are interested in DataBouncing are comparing it to the libraries listed below
- fully async implementation of Dirkjan's ROADTools☆31Updated last year
- HTML Smuggling with Web Assembly☆59Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- SMB Audit Tool you were looking for☆21Updated last year
- Living Off the Foreign Land setup scripts☆65Updated 2 weeks ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- ☆20Updated 3 months ago
- Create a lnk shortcut file for Windows☆15Updated 5 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated last year
- self-hosted Azure OSINT tool☆26Updated 6 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 7 months ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- Lifetime AMSI bypass.☆35Updated 8 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆38Updated 10 months ago
- Nemesis agent for Mythic☆26Updated 6 months ago
- Extract registry and NTDS secrets from local or remote disk images☆37Updated 6 months ago
- Find Inbound Email Domains☆22Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Async Python library to parse local and remote disk images.☆76Updated 6 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- ☆43Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- tool for identifying guest relationships between companies☆84Updated 8 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆13Updated 2 months ago
- ☆15Updated 5 months ago
- ☆45Updated this week