gsmith257-cyber / Smishing-Triad
Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024
☆10Updated 8 months ago
Alternatives and similar repositories for Smishing-Triad:
Users that are interested in Smishing-Triad are comparing it to the libraries listed below
- porglet development repo☆12Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 10 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Source code for the Binaries of OWASP WrongSecrets☆10Updated 2 months ago
- VSCode Extension for Deciduous☆9Updated last month
- Parser for Windows PowerShell script block logs☆13Updated 2 weeks ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated last month
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆18Updated 10 months ago
- A minimal malware analysis sandbox for macOS☆27Updated last year
- ☆26Updated 4 months ago
- Fast, inline geolocation decoration of IPv4 and IPv6 addresses written in Rust☆25Updated 11 months ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Bugs Framework☆7Updated this week
- Unified interface for some crypto algos☆12Updated last year
- Microsoft Developer Blogs Search Tool☆24Updated 2 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 2 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆25Updated 4 months ago
- Silly proof-of-concept for a PDF chatroom☆21Updated last year
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Tools for macOS Forensic Bootable media☆15Updated 4 years ago
- Create machine images containing the Guacamole remote desktop gateway☆10Updated last month
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Python web app for previewing data in a Chrome Profile Folder☆18Updated 6 months ago
- Queries for parsed spotlight database in sqlite☆11Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 months ago
- ☆16Updated last year