☆121Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for PhishInSuits
Users that are interested in PhishInSuits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆337Apr 17, 2023Updated 3 years ago
- WordPress version identification and vulnerability finder.☆32Apr 21, 2026Updated last week
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆350Feb 23, 2024Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆27Aug 8, 2021Updated 4 years ago
- ☆102Oct 27, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆187Mar 19, 2023Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆615Jun 1, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Jun 9, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆45Oct 16, 2023Updated 2 years ago
- ☆122Nov 21, 2024Updated last year
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆245Jul 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆419Apr 28, 2021Updated 5 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆167May 27, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆56Mar 24, 2021Updated 5 years ago
- User Enumeration of Microsoft Teams users via API☆188Mar 16, 2026Updated last month
- ☆143May 4, 2022Updated 3 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated last month
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆416Apr 12, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆144Nov 21, 2023Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆66Feb 8, 2022Updated 4 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆628Apr 2, 2026Updated last month