dsnezhkov / deepseaLinks
DeepSea Phishing Gear
☆122Updated 5 years ago
Alternatives and similar repositories for deepsea
Users that are interested in deepsea are comparing it to the libraries listed below
Sorting:
- An Insider Threat Toolkit☆155Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 7 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 3 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆142Updated 8 years ago
- ☆127Updated 5 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Updated 6 years ago
- Samba, NFS shares spider and grepper☆71Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Updated 3 years ago
- ☆140Updated 6 years ago
- ☆128Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆124Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Updated 4 years ago
- Microsoft External Attack Tool☆178Updated 3 years ago
- Simple C# for checking for the existence of credential files related to AWS, Microsoft Azure, and Google Compute.☆177Updated 7 years ago
- Hiding implants in HTML files☆66Updated 5 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Updated last year
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Updated version of C2K☆51Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆121Updated 5 years ago