A collection of phishing techniques used to evade detection. #nolockdown
☆23Aug 28, 2025Updated 6 months ago
Alternatives and similar repositories for phishing-techniques
Users that are interested in phishing-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible filter plugin for jq filter expressions☆23Aug 16, 2024Updated last year
- Golang Rest API Template with clear, scalable structure. Built with simplicity and flexibility in mind.☆16Feb 8, 2026Updated last month
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Light-weight, cross-platform (NET Core 2.1) C# Asynchronous file server and text messaging platform. Utilizes custom extension methods wh…☆12Mar 28, 2019Updated 6 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- .NET Core minimal DNS server - .NET Core Port of ARSoft.Tools.Net☆12May 30, 2023Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last week
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- SpyCore - Windows Malicious FIle Scanner (Distributes)☆14Jun 10, 2023Updated 2 years ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- 🚀 SimpleX Chat website☆14Mar 9, 2023Updated 3 years ago
- ☆75Nov 28, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Pillars.js is a modular framework for web development in Node.js☆51Aug 10, 2022Updated 3 years ago
- EclipseColorThemes.org to PowerShell ISE theme converter☆11Jun 15, 2015Updated 10 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 10 months ago
- Rules shared by the community from 100 Days of YARA 2024☆89Jan 1, 2025Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- ☆10Feb 9, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Chalk allows you to follow code from development, through builds and into production.☆422Mar 18, 2026Updated last week
- Some recipes around Apple CreateML☆12Apr 26, 2021Updated 4 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- C# Xamarin / Node.js Socket.IO cross platform mobile messenger client and server bundle☆12Jun 22, 2022Updated 3 years ago
- Brute Ratel External C2 (Microsoft Teams)☆38Dec 11, 2024Updated last year
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago