TH3xACE / genAvatarLinks
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆14Updated 2 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- Simple C2 over the Trello API☆39Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Free Email Providers☆11Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 weeks ago
- Only for educational purposes☆12Updated 2 years ago
- ☆24Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Various scripts & tools☆12Updated last year
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago