☆192Nov 13, 2025Updated 5 months ago
Alternatives and similar repositories for GitPhish
Users that are interested in GitPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Updated this week
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- ☆122Nov 21, 2024Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 months ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆99Mar 10, 2026Updated last month
- Linker for Beacon Object Files☆177Mar 30, 2026Updated 2 weeks ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆95Mar 17, 2026Updated last month
- ☆50Jun 4, 2025Updated 10 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 10 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆413Aug 18, 2025Updated 8 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 9 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated 10 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆345Mar 21, 2026Updated 3 weeks ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- ☆100Sep 1, 2024Updated last year
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Mar 16, 2026Updated last month
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- Random BOFs for LDAP tradecraft☆74Sep 9, 2025Updated 7 months ago
- ☆193Nov 21, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 7 months ago
- Azure DevOps Services Attack Toolkit☆151Mar 15, 2025Updated last year
- ☆37Jul 1, 2025Updated 9 months ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆128Jan 17, 2026Updated 3 months ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year