andpalmier / MLWithPhishing
Machine Learning basics with phishing dataset
☆10Updated 3 years ago
Alternatives and similar repositories for MLWithPhishing:
Users that are interested in MLWithPhishing are comparing it to the libraries listed below
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- Some Pentesting Scripts☆10Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆20Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆17Updated 4 years ago
- ☆12Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆14Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago