BlackMail is a tool for creating and sending spoof mail.
☆37Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for blackmail
Users that are interested in blackmail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 4 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 8 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆216Mar 7, 2026Updated last month
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Oct 5, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆126Mar 2, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆46Aug 16, 2024Updated last year
- Camera phishing screen (to take photos from the front and rear cameras)☆71Nov 20, 2025Updated 4 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Set of tools to audit and exploit STUN/TURN servers☆35Dec 12, 2025Updated 4 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆164Dec 11, 2025Updated 4 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IOCs and notes related to malware☆27Jul 7, 2025Updated 9 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆65Apr 2, 2025Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 5 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 5 months ago
- A OSINT project that explores how to dump data from React☆82Sep 16, 2025Updated 7 months ago
- BLFS: Bitcoin Lightning For Shopify☆13Nov 18, 2025Updated 5 months ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Ludus range for the Constructing Defense Lab☆118Apr 5, 2026Updated 2 weeks ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 8 months ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆41Jul 27, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year