hoodoer / JS-Tap
JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the targeted application. Also includes a C2 for executing custom JavaScript payloads in clients, and a "mimic" feature that automatically generates custom payloads.
☆348Updated last month
Alternatives and similar repositories for JS-Tap:
Users that are interested in JS-Tap are comparing it to the libraries listed below
- Session Hijacking Visual Exploitation☆194Updated 11 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆230Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆346Updated last week
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆152Updated 2 months ago
- Azure mindmap for penetration tests☆175Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆552Updated 7 months ago
- Lab used for workshop and CTF☆172Updated 2 weeks ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆69Updated 11 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆516Updated 3 months ago
- Everything and anything related to password spraying☆131Updated 9 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆388Updated last month
- ☆283Updated last year
- ☆165Updated 5 months ago
- ☆530Updated 10 months ago
- Repository to store exploits created by Assetnotes Security Research team☆174Updated last year
- ☆79Updated 7 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆372Updated 8 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 9 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆139Updated 8 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆364Updated last month
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆447Updated 3 months ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆199Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆177Updated 10 months ago
- A Red Team Activity Hub☆190Updated this week
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆339Updated 2 months ago
- ☆288Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆273Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆660Updated 6 months ago