jakedmurphy1 / GooglePhishingLinks
☆24Updated 3 years ago
Alternatives and similar repositories for GooglePhishing
Users that are interested in GooglePhishing are comparing it to the libraries listed below
Sorting:
- Tools used for Pentesting☆22Updated 2 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Updated last year
- Automate converting webshells into reverse shells.☆71Updated last week
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Azure Service Subdomain Enumeration☆67Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- ☆109Updated last year
- A collection of red blue team staff☆47Updated 2 years ago
- a map for the azure oriented pentests☆68Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- ☆47Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago