leoloobeek / mfastealerView external linksLinks
Stealing MFA/2FA tokens and using them to logon with VPN clients
☆17Jun 4, 2018Updated 7 years ago
Alternatives and similar repositories for mfastealer
Users that are interested in mfastealer are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 4 months ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- gpocheck☆30Aug 11, 2024Updated last year
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Presets for FxSound equalizer software for boosting sound quality, volume, and bass☆10Nov 19, 2025Updated 2 months ago
- ☆13Nov 19, 2022Updated 3 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 2 years ago
- 基于gf框架的token验证插件☆11Sep 1, 2025Updated 5 months ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- ☆10Jul 8, 2024Updated last year
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 5 months ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- VMProtect licensing stuff in golang☆15Jun 19, 2024Updated last year
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- ☆23Jun 28, 2025Updated 7 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Wrapper script for letsencrypt☆11May 27, 2020Updated 5 years ago