☆38Jan 7, 2025Updated last year
Alternatives and similar repositories for mfa-bombing
Users that are interested in mfa-bombing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 7, 2025Updated 3 months ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆189Nov 21, 2024Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆40Feb 23, 2023Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆43Oct 30, 2024Updated last year
- ADVANCE MAIL BOMBING WITH SPOOFING☆15Feb 1, 2022Updated 4 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 4 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Jun 20, 2023Updated 2 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 9 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- ☆117Jun 2, 2021Updated 4 years ago
- ☆28Mar 18, 2026Updated last week
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆423Jan 31, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated evasive phishing infrastructure☆18Feb 11, 2023Updated 3 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- ☆26Feb 11, 2025Updated last year
- Decrypt Veeam database passwords☆222Dec 8, 2025Updated 3 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago