andpalmier / MLWithPhishingLinks
Machine Learning basics with phishing dataset
☆10Updated 4 years ago
Alternatives and similar repositories for MLWithPhishing
Users that are interested in MLWithPhishing are comparing it to the libraries listed below
Sorting:
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- ☆19Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- ☆24Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Citrix Phishlet☆24Updated 4 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- various python scripts☆16Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated 2 years ago
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago