☆31Aug 24, 2022Updated 3 years ago
Alternatives and similar repositories for O365-BITB
Users that are interested in O365-BITB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31May 31, 2022Updated 3 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 5 years ago
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆18Aug 31, 2023Updated 2 years ago
- A websocket-based reverse (javascript) shell for XSS attacks.☆29Sep 2, 2022Updated 3 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 3 years ago
- Turn GNU nano editor into a fancy & powerful editor.☆16Aug 20, 2021Updated 4 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Simple Nmap XML parsing script. Doesn't do anything fancy☆22Oct 22, 2020Updated 5 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Advanced AWS Access Credentials Scanner ⚡☆13Apr 26, 2023Updated 3 years ago
- Tutorial session from PyData London, Fri 6 May 2016☆11May 6, 2016Updated 10 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 7 months ago
- ☆17May 29, 2015Updated 10 years ago
- Hackintosh-OpenCore☆15Mar 27, 2021Updated 5 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆45Mar 5, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 6 months ago
- ☆47Jun 1, 2025Updated 11 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- deploying a wifi hotspot with captive portal using coovachilli in raspbian or ubuntu☆16Apr 6, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Phishing Framework for OTP codes☆49Apr 14, 2026Updated 3 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- Golang / SegDSP Spectrum Paint Generator☆10Feb 20, 2019Updated 7 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 4 years ago