BlackMail is a tool for creating and sending spoof mail.
☆37Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for blackmail
Users that are interested in blackmail are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated 2 months ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 5 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 7 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆220Mar 7, 2026Updated 2 months ago
- ☆12Aug 16, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Oct 5, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- Obex – Blocking unwanted DLLs in user mode☆283Sep 18, 2025Updated 7 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆59Jan 17, 2026Updated 3 months ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 11 months ago
- Camera phishing screen (to take photos from the front and rear cameras)☆73Apr 28, 2026Updated last week
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆166Apr 25, 2026Updated 2 weeks ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 10 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- ☆13Mar 6, 2025Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 6 months ago
- Real HTTP, SOCKS4, SOCKS5 proxy scrapper, hunter, checker for PHP, Python, NodeJS☆12Updated this week
- A OSINT project that explores how to dump data from React☆82Sep 16, 2025Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- You can't say no to this proposal.☆16Jun 13, 2023Updated 2 years ago
- ☆12Aug 14, 2018Updated 7 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆129Jan 26, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- Using this you send fake visitors to your site. It uses the Tor network and will not have the same ip address.☆10May 29, 2024Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆491Mar 15, 2026Updated last month
- An User Friendly ADB Logcat Viewer written in React and NodeJS☆12Dec 11, 2022Updated 3 years ago
- An open source tool for scrapping fresh and usable proxies. Supports HTTP, SOCKS4, SOCKS5☆15Nov 7, 2024Updated last year
- Socks5 & Socks4 & HTTPS IP:PORT proxy list are updated occasionally. Proxy list source links & API links☆13Apr 7, 2025Updated last year