stevesec / espooferLinks
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
β12Updated last year
Alternatives and similar repositories for espoofer
Users that are interested in espoofer are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesisβ55Updated 7 months ago
- Phishing Framework for OTP codesβ33Updated last month
- Generate password spraying lists based on the pwdLastSet-attribute of users.β56Updated last year
- β51Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLβ40Updated last year
- Tool to extract username and password of current user from PanGPA in plaintextβ85Updated 6 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannelβ37Updated 2 months ago
- Automated Evilginx phishlet creator Extension for Burpsuiteβ52Updated 5 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstalβ¦β34Updated 7 months ago
- β59Updated 8 months ago
- sturdy-chainsawβ63Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ23Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β47Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.β30Updated 2 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTPβ38Updated 5 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exeβ13Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)β57Updated 3 weeks ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.β27Updated this week
- SANS Workshop: Active Directory Privilege Escalation with Empire!β31Updated 2 months ago
- Example code samples from our ScriptBlock Smuggling Blog postβ91Updated last year
- Azure Service Subdomain Enumerationβ61Updated 9 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.β81Updated 9 months ago
- A Moodle Scannerβ42Updated 7 months ago
- β28Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!β92Updated 2 months ago
- Brief writeup of post exploitation methodologies.β18Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ88Updated last year
- β44Updated 11 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.β12Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β30Updated 5 months ago