eddiechu / File-SmugglingLinks
HTML smuggling is not an evil, it can be useful
☆387Updated last year
Alternatives and similar repositories for File-Smuggling
Users that are interested in File-Smuggling are comparing it to the libraries listed below
Sorting:
- Wordlist to crack .zip-file password☆204Updated 2 years ago
- PasteBomb C2-less RAT☆320Updated 8 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 5 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆548Updated 4 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆338Updated last year
- ☆300Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆308Updated last year
- ☆543Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆370Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆248Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆790Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆179Updated 4 months ago
- it is very good☆515Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 2 weeks ago
- ☆301Updated 4 months ago
- Phishing with a fake reCAPTCHA☆575Updated 10 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆406Updated last month
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated 9 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆411Updated last year
- Embed a payload inside a PNG file☆328Updated 8 months ago
- PowerShell Obfuscator☆179Updated last year
- ☆298Updated 2 years ago
- ☆325Updated 4 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆455Updated 4 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆364Updated 5 months ago
- Generate FUD backdoors☆249Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- Tool to remotely dump secrets from the Windows registry☆471Updated last month
- Script for generating revshells☆473Updated 10 months ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Updated 2 years ago