HTML smuggling is not an evil, it can be useful
☆14Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for File-Smuggling
Users that are interested in File-Smuggling are comparing it to the libraries listed below
Sorting:
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- ☆33Jan 23, 2025Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- Fly into Gophish with One Click (Infra Automation)☆52Mar 30, 2023Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆16Feb 13, 2024Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- Script used to track airtags (using Apple's Find My-network through the Find My-app on macOS) and save the location history data to CSV f…☆13Nov 19, 2024Updated last year
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Cobalt Strike random C2 Profile generator☆16Nov 10, 2025Updated 3 months ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- ☆35Sep 13, 2022Updated 3 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- ☆19Nov 28, 2024Updated last year
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 2 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago