m1nl / pompa
Fully-featured spear-phishing toolkit - web front-end
☆49Updated last month
Alternatives and similar repositories for pompa:
Users that are interested in pompa are comparing it to the libraries listed below
- Reconnaissance tool for Microsoft Office 365☆67Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated 8 months ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- Automating those tasks which can or should be automated☆62Updated 7 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 5 years ago
- Tool for password spraying RDP☆93Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- Automated 802.1x Bypass☆84Updated 4 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- ☆55Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- SMB Named Pipe shell☆63Updated 3 months ago
- Responsive Command and Control System☆102Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆73Updated 5 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆40Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆49Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆78Updated 3 years ago
- Samba, NFS shares spider and grepper☆71Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- Powershell MS Outlook enumeration and phishing tool☆75Updated 8 years ago