A Windows 10 login phishing page for your red team exercises
☆15Apr 25, 2021Updated 4 years ago
Alternatives and similar repositories for Win10CredsThief
Users that are interested in Win10CredsThief are comparing it to the libraries listed below
Sorting:
- ☆18Sep 14, 2023Updated 2 years ago
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆20Feb 16, 2023Updated 3 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Python tool for kidnapping Chrome cookies from a MacOS target☆22Oct 5, 2022Updated 3 years ago
- ☆39Nov 25, 2025Updated 3 months ago
- Ansible role for installing Sysmon with popular config files included.☆24Jan 8, 2023Updated 3 years ago
- ☆79Sep 8, 2025Updated 6 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 7 months ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 3 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Enterprise Response Model & Common Knowledge☆38Jul 3, 2025Updated 8 months ago
- Living Off the Foreign Land setup scripts☆74Feb 26, 2025Updated last year
- ☆84May 19, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 3 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- execute PE in memory Filelessly☆52Feb 8, 2025Updated last year
- A VS Code extension to preview XML nmap output☆43Feb 20, 2025Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- ☆15Sep 4, 2024Updated last year
- Ansible Collection☆12Apr 22, 2025Updated 10 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆44Jul 5, 2024Updated last year
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- ☆45Feb 2, 2025Updated last year
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year