ahhh / phish_composerLinks
Automatically spin up infra for phishing
☆65Updated 5 years ago
Alternatives and similar repositories for phish_composer
Users that are interested in phish_composer are comparing it to the libraries listed below
Sorting:
- Automated 802.1x Bypass☆86Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Miscellaneous for various things☆21Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Updated 3 weeks ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 2 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 11 months ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- ☆37Updated 5 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- ☆16Updated 8 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 6 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 7 years ago
- Enumerate RIDs using pure Python☆32Updated last year
- Active Directory information dumper via LDAP☆13Updated 5 years ago