☆306Jun 16, 2024Updated last year
Alternatives and similar repositories for PWA-Phishing
Users that are interested in PWA-Phishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆644May 8, 2025Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆444May 29, 2024Updated last year
- ☆236Oct 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,032Apr 17, 2026Updated last month
- Extract and execute a PE embedded within a PNG file using an LNK file.☆471Nov 2, 2024Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆517Aug 7, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated 2 years ago
- Decrypt Veeam database passwords☆224Dec 8, 2025Updated 5 months ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆193Mar 4, 2024Updated 2 years ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆444Jul 8, 2024Updated last year
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆188Jun 14, 2025Updated 11 months ago
- ☆22Jul 15, 2023Updated 2 years ago
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,290May 4, 2026Updated 2 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆437Mar 28, 2026Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,459Apr 9, 2026Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆291Jan 21, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆876Feb 3, 2024Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆565Jun 3, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆720Mar 22, 2024Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆735May 7, 2025Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆631Jun 25, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆257Jun 6, 2024Updated last year
- ☆32Jun 1, 2024Updated last year
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,146Jun 10, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Jun 15, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆365Dec 13, 2025Updated 5 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆294May 27, 2024Updated last year
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year