eddiechu / File-Smuggling
HTML smuggling is not an evil, it can be useful
☆384Updated last year
Alternatives and similar repositories for File-Smuggling:
Users that are interested in File-Smuggling are comparing it to the libraries listed below
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆689Updated 10 months ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- ☆532Updated last year
- PasteBomb C2-less RAT☆320Updated 4 months ago
- ☆287Updated 9 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- Embed a payload inside a PNG file☆302Updated 5 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆407Updated last week
- Different methods to get current username without using whoami☆174Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- This repository presents a proof-of-concept of CVE-2023-7028☆239Updated last year
- Script for generating revshells☆466Updated 6 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 6 months ago
- ☆291Updated last year
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆532Updated 3 weeks ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆352Updated 5 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆568Updated 9 months ago
- Tool to remotely dump secrets from the Windows registry☆437Updated last month
- Phishing with a fake reCAPTCHA☆511Updated 6 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆286Updated 9 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆534Updated 4 months ago
- ☆294Updated 2 weeks ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆367Updated 2 months ago
- ☆304Updated 3 months ago
- Ask a TGS on behalf of another user without password☆468Updated 8 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆472Updated 4 months ago
- MultiPlatform HTTP Reverse Shell☆231Updated 6 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated 7 months ago