An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
β13Mar 5, 2024Updated 2 years ago
Alternatives and similar repositories for espoofer
Users that are interested in espoofer are comparing it to the libraries listed below
Sorting:
- OSCP preparationβ12Sep 18, 2025Updated 5 months ago
- A simple BOF that disables some logging with NtSetInformationProcessβ13Oct 13, 2023Updated 2 years ago
- A C# Tool to gather information about email breachesβ16Dec 21, 2023Updated 2 years ago
- Tool for scanning domains for .git directories.β17Oct 2, 2023Updated 2 years ago
- β73Feb 12, 2026Updated 3 weeks ago
- Guide on using the PPPwnGo GUI toolβ11Sep 26, 2024Updated last year
- Beacon Object Files (not Buffer Overflows)β58Mar 6, 2023Updated 2 years ago
- Tomcat backdoor based on CS blogβ29Jun 30, 2023Updated 2 years ago
- Beacon Object File to locate and suspend the threads hosting the Event Log serviceβ29Jun 17, 2022Updated 3 years ago
- Tool for efficient directory enumerationβ65Jan 27, 2026Updated last month
- β85May 15, 2025Updated 9 months ago
- exfiltration/infiltration toolkitβ23Dec 20, 2023Updated 2 years ago
- A repo of scripts I find helpful for daily tasks.β30Dec 8, 2025Updated 2 months ago
- An example of COM hijacking using a proxy DLL.β44Aug 17, 2021Updated 4 years ago
- This technique leverages PowerShell'sΒ .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typβ¦β52May 16, 2025Updated 9 months ago
- β11Apr 18, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected netβ¦β10Apr 16, 2018Updated 7 years ago
- CVE-2013-4786 Go exploitation toolβ40Nov 18, 2025Updated 3 months ago
- Track C2 servers, tools, and botnets over time by framework and locationβ43Feb 9, 2025Updated last year
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.β101Jan 26, 2026Updated last month
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Techniqueβ158Nov 7, 2023Updated 2 years ago
- An NPU-accelerated chatbot running via AnythingLLMβ17Jul 3, 2025Updated 8 months ago
- NTAPI hook bypass with (semi) legit stack traceβ19May 9, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.β13Jul 24, 2023Updated 2 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accountsβ11Apr 25, 2023Updated 2 years ago
- ATL.dll and WmiMgmt.msc UAC Bypassβ12Apr 26, 2025Updated 10 months ago
- DFSCoerce exe revisited version with custom authenticationβ42Jan 13, 2024Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.β10Apr 8, 2024Updated last year
- β47Feb 11, 2023Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.β40Jan 7, 2023Updated 3 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified processβ47Jun 15, 2022Updated 3 years ago
- Collection of self-made Red Team tools that have come in handyβ12Aug 25, 2024Updated last year
- β12Oct 19, 2024Updated last year
- β16Jun 15, 2025Updated 8 months ago
- β12Feb 28, 2023Updated 3 years ago
- Threadless Injection Payload Toolkitβ12Oct 12, 2023Updated 2 years ago
- Youtube Resume Buildβ12May 16, 2024Updated last year
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.todayβ34Sep 22, 2025Updated 5 months ago
- Shellcode loader with evasion capabilities written in Nimβ15Jan 25, 2025Updated last year