TH3xACE / genAvatarLinks
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆14Updated 2 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆18Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Red Team Infrastructure: Covenant C2☆10Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- ☆22Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- ☆12Updated 4 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago