☆120Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for PhishInSuits
Users that are interested in PhishInSuits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆333Apr 17, 2023Updated 2 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆345Feb 23, 2024Updated 2 years ago
- ☆26Aug 8, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆102Oct 27, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆187Mar 19, 2023Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆615Jun 1, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆245Jul 14, 2021Updated 4 years ago
- ☆419Apr 28, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆166May 27, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago
- User Enumeration of Microsoft Teams users via API☆187Mar 16, 2026Updated 3 weeks ago
- ☆142May 4, 2022Updated 3 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated last month
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆406Feb 9, 2026Updated 2 months ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆88Jan 11, 2024Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆143Nov 21, 2023Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆621Apr 2, 2026Updated last week
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆270Sep 14, 2023Updated 2 years ago