Automated evasive phishing infrastructure
☆18Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for autosneakphish
Users that are interested in autosneakphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 27, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆33Aug 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆40May 21, 2022Updated 3 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- C2 Automation using Linode☆86Sep 24, 2022Updated 3 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- My implementation of Halo's Gate technique in C#☆55Apr 20, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆38Jan 7, 2025Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- ☆40Feb 23, 2023Updated 3 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Repository for write-ups of Sofia Santos' OSINT exercises☆18Sep 29, 2025Updated 6 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- shellcode loader by c++,免杀,bypass,☆15Sep 5, 2022Updated 3 years ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Comprehensive Roadmap to Becoming a Web3 Security Auditor☆24Jan 15, 2025Updated last year
- ☆19Nov 28, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago