☆121Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for PhishInSuits
Users that are interested in PhishInSuits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆339Apr 17, 2023Updated 3 years ago
- WordPress version identification and vulnerability finder.☆32Apr 21, 2026Updated last month
- leaking net-ntlm with webdav☆25Feb 23, 2021Updated 5 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆354Feb 23, 2024Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆730Dec 6, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆28Aug 8, 2021Updated 4 years ago
- ☆103Oct 27, 2022Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆187Mar 19, 2023Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆614Jun 1, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Jun 9, 2024Updated last year
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- ☆45Oct 16, 2023Updated 2 years ago
- ☆123Nov 21, 2024Updated last year
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆245Jul 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆420Apr 28, 2021Updated 5 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆167May 27, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆57Mar 24, 2021Updated 5 years ago
- User Enumeration of Microsoft Teams users via API☆188Mar 16, 2026Updated 2 months ago
- ☆143May 4, 2022Updated 4 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆508Mar 4, 2026Updated 2 months ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆420Apr 12, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆89Jan 11, 2024Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆144Nov 21, 2023Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆66Feb 8, 2022Updated 4 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆638Apr 2, 2026Updated last month