Fully-featured spear-phishing toolkit - web front-end
☆52Jan 11, 2025Updated last year
Alternatives and similar repositories for pompa
Users that are interested in pompa are comparing it to the libraries listed below
Sorting:
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- SettingContent-MS File Execution vulnerability in Windows 10☆24Jan 7, 2026Updated 2 months ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- HyteraTAK - Hytera to Cursor-On-Target Gateway☆12Jun 6, 2022Updated 3 years ago
- Audit Proposals and Reports for RandomX☆12Aug 3, 2019Updated 6 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- Mapa wyświetlająca dane z wykazu pozwoleń radiowych UKE dla klasycznych sieci radiokomunikacji ruchomej lądowej.☆14Dec 26, 2025Updated 2 months ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A basic Django project that implements an IVR telephony system with Twilio☆12Jul 17, 2014Updated 11 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 5 months ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- an Excel 2007+ Binary Workbook (xlsb) parser for Python☆22May 9, 2022Updated 3 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Sample application demonstrating automated voice surveys with Twilio and Ruby on Rails☆10Jul 13, 2023Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- A simple yet beautiful phishing proxy.☆58Aug 13, 2021Updated 4 years ago