☆117Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for PhishInSuits
Users that are interested in PhishInSuits are comparing it to the libraries listed below
Sorting:
- ☆332Apr 17, 2023Updated 2 years ago
- WordPress version identification and vulnerability finder.☆31Oct 4, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆342Feb 23, 2024Updated 2 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- ☆102Oct 27, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆187Mar 19, 2023Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆614Jun 1, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Jun 9, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- ☆121Nov 21, 2024Updated last year
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆244Jul 14, 2021Updated 4 years ago
- ☆418Apr 28, 2021Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆166May 27, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- ☆142May 4, 2022Updated 3 years ago
- User Enumeration of Microsoft Teams users via API☆187Updated this week
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆505Mar 4, 2026Updated 2 weeks ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Nov 21, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆87Jan 11, 2024Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago