TH3xACE / genAvatarLinks
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆14Updated 2 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆18Updated 5 years ago
- Free Email Providers☆11Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆18Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated last week
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Various scripts & tools☆12Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- ☆14Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- ☆17Updated 3 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- ☆20Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- A collection of my presentation materials.☆17Updated last year