andpalmier / MLWithPhishingView external linksLinks
Machine Learning basics with phishing dataset
☆10Apr 19, 2021Updated 4 years ago
Alternatives and similar repositories for MLWithPhishing
Users that are interested in MLWithPhishing are comparing it to the libraries listed below
Sorting:
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- extracts shellcode from a nasm compile macho binary☆16Jan 28, 2021Updated 5 years ago
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- ☆39May 21, 2022Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- Goldphish phishing server with ngrok tunneling support.☆19Sep 7, 2018Updated 7 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Shellcode runner in Rust☆34Oct 30, 2020Updated 5 years ago
- Visa cvv tool for obtaining promotional visas and running the performance and will give you 20 with all its information.☆10Jun 25, 2021Updated 4 years ago
- ☆28Jun 4, 2019Updated 6 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 18, 2022Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- ☆10Apr 29, 2023Updated 2 years ago