RootUp / SmuggleShield
Protection against HTML smuggling attacks.
☆94Updated last week
Alternatives and similar repositories for SmuggleShield:
Users that are interested in SmuggleShield are comparing it to the libraries listed below
- Living Off Security Tools☆45Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆79Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆68Updated this week
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆81Updated 2 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆164Updated 6 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆105Updated last week
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆76Updated last month
- Addon for BHCE☆41Updated last week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆76Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆38Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆128Updated 2 weeks ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 10 months ago
- Ping-based Information Lookup and Outbound Transfer☆76Updated 11 months ago
- ☆58Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated 2 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆135Updated last month
- ☆37Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 3 weeks ago
- ☆91Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆108Updated 2 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆50Updated last month
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆85Updated 8 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆45Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆99Updated last month