ahhh / phish_composerLinks
Automatically spin up infra for phishing
☆64Updated 5 years ago
Alternatives and similar repositories for phish_composer
Users that are interested in phish_composer are comparing it to the libraries listed below
Sorting:
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 6 months ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- ☆16Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- ☆36Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆81Updated 4 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 8 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- wordlists for password cracking☆28Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Miscellaneous for various things☆21Updated 8 months ago