mip22 is a advanced phishing tool
☆664Jul 31, 2024Updated last year
Alternatives and similar repositories for mip22
Users that are interested in mip22 are comparing it to the libraries listed below
Sorting:
- 🎞 lan and wifi interception. Gnu/Linux Version☆18Oct 18, 2020Updated 5 years ago
- Rogue access point tool.☆57Jun 22, 2022Updated 3 years ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Username enumeration & reconnaisance suite☆178Jun 14, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Dec 19, 2021Updated 4 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆461Oct 30, 2022Updated 3 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,561Aug 20, 2024Updated last year
- evilginx3 + gophish☆1,962Jun 15, 2024Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- A python script to dump files and folders remotely from a Windows SMB share.☆227Jan 31, 2025Updated last year
- grim reaper c2☆346Nov 19, 2022Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Dec 1, 2022Updated 3 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,424Jan 19, 2025Updated last year
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Wi-Fi Exploitation Framework☆2,766Sep 24, 2025Updated 5 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆625May 2, 2025Updated 10 months ago
- Graph Visualization for windows event logs☆242Jan 15, 2025Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Persistence by writing/reading shellcode from Event Log☆379May 27, 2022Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Php program for ddos attack (ip,url)☆64Jun 22, 2022Updated 3 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Dec 12, 2025Updated 2 months ago
- EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具☆735Mar 4, 2022Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆540Feb 7, 2024Updated 2 years ago
- A tool to kill antimalware protected processes☆1,505Jun 19, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago