erenakkaya / blackmailView external linksLinks
BlackMail is a tool for creating and sending spoof mail.
☆37Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for blackmail
Users that are interested in blackmail are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Jan 2, 2026Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆207Sep 20, 2025Updated 4 months ago
- ☆12Aug 16, 2024Updated last year
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 2 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆31Aug 2, 2025Updated 6 months ago
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Oct 5, 2023Updated 2 years ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆117Dec 23, 2025Updated last month
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- Threat Mitigation Strategies☆27Aug 18, 2025Updated 5 months ago
- Obex – Blocking unwanted DLLs in user mode☆280Sep 18, 2025Updated 4 months ago
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Camera phishing screen (to take photos from the front and rear cameras)☆57Nov 20, 2025Updated 2 months ago
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆158Dec 11, 2025Updated 2 months ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 7 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Nov 10, 2025Updated 3 months ago
- ☆156Oct 28, 2025Updated 3 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 8 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆56Jan 17, 2026Updated last month
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- Set of tools to audit and exploit STUN/TURN servers☆32Dec 12, 2025Updated 2 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- A command-line utility for performing reverse DNS lookups☆74Aug 10, 2023Updated 2 years ago
- Just another EDR killer☆94Jan 21, 2026Updated 3 weeks ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 6 months ago
- DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky☆12Sep 29, 2018Updated 7 years ago
- Telegram base free Rat☆11Apr 26, 2025Updated 9 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆11Aug 4, 2022Updated 3 years ago
- ☆12May 11, 2025Updated 9 months ago
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- A .Net MVC 3 Site template for creating HTML5 Slideshow presenations. Based on @robflaherty 's html5-slideshow project.☆21Sep 9, 2011Updated 14 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆16Jan 24, 2024Updated 2 years ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆118Oct 6, 2025Updated 4 months ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago