gophish / gomail
The best way to send emails in Go.
☆10Updated 4 years ago
Alternatives and similar repositories for gomail:
Users that are interested in gomail are comparing it to the libraries listed below
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- ☆16Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week
- Working exploit code for CVE-2019-17625☆17Updated 4 years ago
- ☆17Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- ☆16Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 5 years ago
- CVE-2020-0688 PoC☆10Updated 3 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Machine Learning basics with phishing dataset☆10Updated 3 years ago