rc4 / gophish-macro-attachmentLinks
Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests
☆23Updated 4 years ago
Alternatives and similar repositories for gophish-macro-attachment
Users that are interested in gophish-macro-attachment are comparing it to the libraries listed below
Sorting:
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆35Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Password Spraying Framework☆63Updated 3 years ago
- Library of sites for categorization☆27Updated 6 years ago
- MimeCast Password Spraying Tool☆47Updated 5 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Updated 4 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated 2 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- ☆97Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Various scripts and codes☆85Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 10 months ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- ☆77Updated 2 months ago
- Username lists that I created.☆17Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- ☆42Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago