☆12Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for Winphish
Users that are interested in Winphish are comparing it to the libraries listed below
Sorting:
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- ☆31May 31, 2022Updated 3 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 4 months ago
- Single Repository to keep policy and simmilar documentation☆35Feb 16, 2025Updated last year
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- MiniDump a process in memory with rust☆37Jun 20, 2021Updated 4 years ago
- VM Escape for Parallels Desktop <18.1.1☆37May 7, 2023Updated 2 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 2 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- This repo contains a list of aws security related talks.☆12Dec 5, 2017Updated 8 years ago
- ☆10Mar 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- ☆10Dec 5, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- HTML parser for PEAS output with additional features☆123Feb 15, 2026Updated 2 weeks ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Jul 19, 2024Updated last year
- ☆13Dec 12, 2022Updated 3 years ago
- My personal Maid rules, as an example or source of inspiration for your own. :)☆21Nov 5, 2013Updated 12 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year