chrismaddalena / CooperView external linksLinks
A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.
☆59Jan 18, 2026Updated 3 weeks ago
Alternatives and similar repositories for Cooper
Users that are interested in Cooper are comparing it to the libraries listed below
Sorting:
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- discover IP ranges. check email security. survey domains.☆40Mar 9, 2023Updated 2 years ago
- ☆25May 13, 2019Updated 6 years ago
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- A library of pretexts to use on offensive phishing engagements.☆383Aug 9, 2019Updated 6 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 10 months ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆654Jan 6, 2022Updated 4 years ago
- A Python script to collect campaign data from Gophish and generate a report☆199Nov 15, 2022Updated 3 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Check Domain Categorization☆78Feb 11, 2021Updated 5 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆12Aug 10, 2024Updated last year
- Transform your pwnagotchi sidekick into a cyber deck rover!☆12Sep 26, 2025Updated 4 months ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- A library to parse macOS LoginItems☆18Aug 28, 2022Updated 3 years ago
- Discover Printers☆168Sep 18, 2019Updated 6 years ago