Eating 2FA for Breakfast
☆57Nov 2, 2022Updated 3 years ago
Alternatives and similar repositories for humble_chameleon
Users that are interested in humble_chameleon are comparing it to the libraries listed below
Sorting:
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Phishing Framework for Pentesters☆200May 16, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆609Dec 9, 2025Updated 2 months ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- A nice process dumping tool☆82Jul 19, 2022Updated 3 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- ☆15Sep 4, 2024Updated last year
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- ☆138Nov 17, 2025Updated 3 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆106Jan 24, 2024Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- ☆47Jan 31, 2024Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆27Mar 6, 2025Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- ☆50Jun 4, 2025Updated 9 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- ☆207Dec 17, 2025Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- ☆117Jun 17, 2025Updated 8 months ago
- ☆124May 12, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Hiding GoPhish from the boys in blue☆201Dec 6, 2022Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆78Jan 1, 2025Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- ☆102Oct 27, 2022Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago