☆38Jan 7, 2025Updated last year
Alternatives and similar repositories for mfa-bombing
Users that are interested in mfa-bombing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 7, 2025Updated 5 months ago
- C# version of NTLMRawUnHide☆72Oct 8, 2022Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆33Aug 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆194Nov 21, 2024Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 8 months ago
- ☆40Feb 23, 2023Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆44Oct 30, 2024Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- asynchronous SSH client in Python☆11Oct 29, 2025Updated 6 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- A tool to use novel locations to extract metadata from Office documents.☆64Jun 20, 2023Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- ☆121Jun 2, 2021Updated 4 years ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆16Feb 1, 2022Updated 4 years ago
- ☆28Mar 18, 2026Updated last month
- Automated evasive phishing infrastructure☆18Feb 11, 2023Updated 3 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆438Mar 28, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- ☆26Feb 11, 2025Updated last year
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Decrypt Veeam database passwords☆224Dec 8, 2025Updated 4 months ago