dale-ruane / FudgeLinks
Hiding implants in HTML files
☆65Updated 5 years ago
Alternatives and similar repositories for Fudge
Users that are interested in Fudge are comparing it to the libraries listed below
Sorting:
- Automatically spin up infra for phishing☆64Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Enumerate RIDs using pure Python☆31Updated 10 months ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 6 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆86Updated 5 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- ☆94Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- VBA Reversed TCP Meterpreter Stager☆63Updated 7 years ago
- AMSI bypass stager generator☆28Updated 6 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 6 years ago
- ☆56Updated 5 years ago
- Tool for password spraying RDP☆96Updated 6 years ago
- Samba, NFS shares spider and grepper☆70Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- ☆42Updated 7 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆78Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago