TH3xACE / genAvatarLinks
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆14Updated 2 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- ☆22Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 4 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated last month
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- CVE-2013-4786 Go exploitation tool☆39Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago
- wsnet☆26Updated last month
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago