Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.
☆81Sep 11, 2025Updated 5 months ago
Alternatives and similar repositories for Inboxfuscation
Users that are interested in Inboxfuscation are comparing it to the libraries listed below
Sorting:
- Ludus range for the Constructing Defense Lab☆102Updated this week
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆160Dec 11, 2025Updated 2 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Collection of powershell scripts I used to complete my CARTP and CARTE courses.☆49Updated this week
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 5 months ago
- Search information across a youtube Channel☆15Dec 10, 2024Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 7 months ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- tiktok tools | scrapping | automation☆31Nov 10, 2025Updated 3 months ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Updated this week
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- evilginx2 + gophish☆14Sep 8, 2022Updated 3 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- AppLocker Policy Generator☆25Aug 25, 2025Updated 6 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 4 months ago
- Vectored Exception Handling Squared☆29Dec 27, 2025Updated 2 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated last month
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆501Oct 3, 2025Updated 4 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆94Feb 10, 2026Updated 2 weeks ago
- ☆96Aug 3, 2025Updated 6 months ago
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆153Feb 2, 2026Updated 3 weeks ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆68Feb 3, 2026Updated 3 weeks ago
- A Win7 RDP exploit☆13May 14, 2019Updated 6 years ago
- ☆53Sep 23, 2025Updated 5 months ago
- Red Team tools containerized☆75Dec 6, 2025Updated 2 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆24May 18, 2025Updated 9 months ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Jul 3, 2024Updated last year
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Jan 4, 2026Updated last month
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆162Aug 30, 2025Updated 6 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago