Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)
☆344Sep 21, 2023Updated 2 years ago
Alternatives and similar repositories for SpamChannel
Users that are interested in SpamChannel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Your Windows syscall hooking factory - feat Canterlot's Gate - All accessible over MCP☆127Updated this week
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆247Mar 19, 2024Updated 2 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆181Aug 16, 2025Updated 7 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,111Jun 19, 2024Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆317Aug 31, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Aug 2, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Sep 30, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,373Mar 9, 2026Updated 2 weeks ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated last month
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- ☆291Jul 20, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- ☆301Oct 29, 2024Updated last year
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆466Aug 23, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Aug 2, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆324Jun 18, 2023Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆751May 23, 2025Updated 10 months ago
- .net config loader☆349Nov 9, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,013Jan 7, 2026Updated 2 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆263Jun 29, 2024Updated last year
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Performing Indirect Clean Syscalls☆605Apr 19, 2023Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- COFF file (BOF) for managing Kerberos tickets.☆320Jul 2, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- evilginx3 + gophish☆1,970Jun 15, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,304Dec 7, 2023Updated 2 years ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆331Jul 15, 2024Updated last year
- Lifetime AMSI bypass☆672Sep 26, 2023Updated 2 years ago
- Signtool for expired certificates☆513Jun 10, 2023Updated 2 years ago