fyoozr / phisherLinks
Easy phishing environment builder (Red Team)
☆16Updated 11 months ago
Alternatives and similar repositories for phisher
Users that are interested in phisher are comparing it to the libraries listed below
Sorting:
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Wolfy AV Bypasser☆29Updated 2 years ago
- ☆100Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- ☆92Updated 2 years ago
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆36Updated 3 weeks ago
- ☆219Updated last year
- ☆231Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- Use ESC1 to perform a makeshift DCSync and dump hashes☆209Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- MSSQL Database Attacker tool☆191Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆111Updated 2 years ago
- ☆89Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆170Updated 11 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆203Updated 9 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆131Updated 2 years ago
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆117Updated 3 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- DCSync Attack from Outside using Impacket☆115Updated 3 years ago
- ☆88Updated 3 months ago
- Active Directory Authentication Library☆79Updated 2 weeks ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookie☆203Updated last year
- ErebusGate for Nim Bypass AV/EDR☆164Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆199Updated last year