claissg / humble_chameleonView external linksLinks
Eating 2FA for Breakfast
☆57Nov 2, 2022Updated 3 years ago
Alternatives and similar repositories for humble_chameleon
Users that are interested in humble_chameleon are comparing it to the libraries listed below
Sorting:
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Phishing Framework for Pentesters☆202May 16, 2023Updated 2 years ago
- ☆15Sep 4, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A nice process dumping tool☆82Jul 19, 2022Updated 3 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆36Dec 12, 2025Updated 2 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ☆137Nov 17, 2025Updated 2 months ago
- Sniffing files generator☆61Feb 24, 2025Updated 11 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆105Jan 24, 2024Updated 2 years ago
- ☆26Mar 6, 2025Updated 11 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- ☆47Jan 31, 2024Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- ☆50Jun 4, 2025Updated 8 months ago
- ☆193Dec 17, 2025Updated last month
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Dec 1, 2025Updated 2 months ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- LinkedIn recon the easy way☆111Jul 3, 2025Updated 7 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆116Jun 17, 2025Updated 8 months ago
- ☆124May 12, 2021Updated 4 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated last month
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Hiding GoPhish from the boys in blue☆201Dec 6, 2022Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Sep 18, 2024Updated last year
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Okta Verify and Okta FastPass Abuse Tool☆339Sep 4, 2024Updated last year
- ☆104Oct 27, 2022Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago