☆12Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for Winphish
Users that are interested in Winphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ شبکه☆21Aug 16, 2023Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- ☆23Mar 9, 2022Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 7 months ago
- A Minecraft 1.15.2 Server implemented in go☆12Oct 17, 2020Updated 5 years ago
- MiniDump a process in memory with rust☆37Jun 20, 2021Updated 4 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 5 months ago
- ☆31May 31, 2022Updated 3 years ago
- سوالات و پاسخ های مصاحبه تست نفوذ وب☆41Nov 3, 2025Updated 4 months ago
- Experimental C++20 multiplatform graphics engine.☆12Dec 22, 2021Updated 4 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆93Apr 23, 2025Updated 11 months ago
- C++ 23 serialization library☆14Jan 25, 2024Updated 2 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- ☆13Mar 7, 2022Updated 4 years ago
- Röttger et al. (2025): "MSTS: A Multimodal Safety Test Suite for Vision-Language Models"☆16Mar 31, 2025Updated 11 months ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- ☆19Sep 9, 2025Updated 6 months ago
- TimSort implementation in JS/ES.☆24Apr 2, 2021Updated 4 years ago
- HTML is a programming language☆17Dec 30, 2022Updated 3 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆20May 1, 2023Updated 2 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- Single Repository to keep policy and simmilar documentation☆35Feb 16, 2025Updated last year
- ☆48Apr 15, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Simple C++ 20 Serialization Library that works out of the box with aggregate types!☆17Sep 11, 2021Updated 4 years ago
- An Android Application for making VoIP calls over FreeSWITCH server☆12Jun 4, 2015Updated 10 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- C# polyfills, your way☆23Nov 20, 2025Updated 4 months ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago