Proof of concept tool used for phishing multi-factor authentication on O365
☆14Aug 8, 2018Updated 7 years ago
Alternatives and similar repositories for mfa_slipstream_poc
Users that are interested in mfa_slipstream_poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- ☆12Nov 24, 2016Updated 9 years ago
- Golang AES Reader Writer Struct☆17Jan 30, 2018Updated 8 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- JSON API for ExploitDB Website☆17Jan 11, 2015Updated 11 years ago
- documentation and notes on how to rebase PM on CyanogenMod☆16Oct 20, 2016Updated 9 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Jul 19, 2017Updated 8 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- ☆20Jul 29, 2016Updated 9 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 3 years ago
- Free cybersecurity training resources☆12Feb 5, 2020Updated 6 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- Interfaces with Daikin Altherma heat pumps via LAN adapter BRP069A61/BRP069A62☆17Mar 26, 2025Updated 11 months ago
- ☆40Aug 25, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- bash script to automate the penetration test☆21Nov 16, 2025Updated 4 months ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- ☆38Jan 29, 2025Updated last year
- Simple Netcat tool written in Go☆23Jun 3, 2023Updated 2 years ago
- 3.10 kernel for Bacon running CM☆18May 27, 2017Updated 8 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 8 years ago
- Turn pdf document into simple annotated XML for further processing in a corpus preparation pipeline.☆13Nov 19, 2019Updated 6 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- SquareWear is an open-source wearable electronics controller board. This repository contains the hardware design files, software library,…☆37Oct 30, 2016Updated 9 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- How to create stickers and files for creating stickers☆32Dec 31, 2023Updated 2 years ago
- ☆19Dec 31, 2025Updated 2 months ago
- Metasploit msfvenom Bash Completions Generator☆43Jul 17, 2016Updated 9 years ago
- ☆38Aug 22, 2018Updated 7 years ago
- ☆28Dec 9, 2018Updated 7 years ago