Automated evasive phishing infrastructure
☆18Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for autosneakphish
Users that are interested in autosneakphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 27, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆14May 28, 2025Updated 11 months ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Panoptes Endpoint Detection and Response Solution☆44Mar 7, 2026Updated 2 months ago
- Secretsdump C# version only supporting local (live) operation☆56Apr 20, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆33Aug 16, 2023Updated 2 years ago
- ☆11Jan 22, 2020Updated 6 years ago
- ☆40May 21, 2022Updated 3 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- Payout Module, a thin C layer around the SSP protocol☆10Nov 6, 2016Updated 9 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C2 Automation using Linode☆87Sep 24, 2022Updated 3 years ago
- ☆14Jun 11, 2025Updated 10 months ago
- BigBlueButton versions lower than 2.2.4 have a LFI vulnerability allowing access to sensitive files. 🚨☆14Apr 23, 2020Updated 6 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- Hilft dein wahres Jahres-Nettoeinkommen zu schätzen und gibt Tipps, wie du deinen steuerlichen Gewinn reduzieren und dadurch deinen reell…☆16Apr 7, 2026Updated last month
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- ☆38Jan 7, 2025Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆17Sep 7, 2019Updated 6 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- ☆40Feb 23, 2023Updated 3 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Group accounts on Fediverse services that don't support them natively.☆23Jan 15, 2025Updated last year
- ☆26Dec 12, 2023Updated 2 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 5 months ago
- ☆13Jul 30, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Updated this week
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆35Jul 23, 2024Updated last year
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago