gophish / gomailLinks
The best way to send emails in Go.
☆12Updated 5 years ago
Alternatives and similar repositories for gomail
Users that are interested in gomail are comparing it to the libraries listed below
Sorting:
- Red Team C2 and Post Exploitation code☆34Updated 7 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- AppXSVC Service race condition - privilege escalation☆30Updated 6 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- Log converter from CS log to Ghostwriter CSV☆31Updated 5 years ago
- Shellcode process injector☆28Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆15Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Updated 4 years ago
- ☆24Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated 2 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Updated 5 years ago
- ☆18Updated 3 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago