☆38Jan 7, 2025Updated last year
Alternatives and similar repositories for mfa-bombing
Users that are interested in mfa-bombing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Connectors REST API Client☆16Jan 29, 2024Updated 2 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Authomize open solutions for partners and customers☆31Jun 17, 2024Updated last year
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆193Nov 21, 2024Updated last year
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Dec 19, 2021Updated 4 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Sep 26, 2023Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Examples of various container types for Python and Golang☆15Aug 29, 2025Updated 7 months ago
- ☆40Feb 23, 2023Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆44Oct 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 5 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 9 months ago
- (DEPRECATED) Azure AD authentication for SSH servers.☆13Apr 19, 2019Updated 6 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- ☆120Jun 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ADVANCE MAIL BOMBING WITH SPOOFING☆16Feb 1, 2022Updated 4 years ago
- ☆28Mar 18, 2026Updated 3 weeks ago
- Automated evasive phishing infrastructure☆18Feb 11, 2023Updated 3 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆436Mar 28, 2026Updated 2 weeks ago
- ☆26Aug 8, 2021Updated 4 years ago
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- ☆26Feb 11, 2025Updated last year