fox-it / signed-phishing-emailView external linksLinks
☆11Dec 18, 2018Updated 7 years ago
Alternatives and similar repositories for signed-phishing-email
Users that are interested in signed-phishing-email are comparing it to the libraries listed below
Sorting:
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- ☆18Jun 14, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- pypykatz plugin for volatility3 framework☆46May 30, 2025Updated 8 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Dead simple C# project to take a screenshot.☆19Jan 14, 2019Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 4 years ago
- Check Bulk IP address for blacklist reputation☆19Dec 2, 2017Updated 8 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130May 25, 2021Updated 4 years ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Service Enumeration C# .NET Assembly☆59Sep 14, 2021Updated 4 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Nov 7, 2020Updated 5 years ago
- Using LNK files and user input simulation to start processes under explorer.exe☆33Sep 21, 2024Updated last year
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆107Jan 3, 2021Updated 5 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy☆29Jun 27, 2020Updated 5 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- A Maltego transform for VirusTotal Submitter Information☆35May 15, 2019Updated 6 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- Simple parser framework.☆26Jun 21, 2023Updated 2 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago