W Generator - A powerful frontend tool for penetration testers to generate customized wordlists based on public user information
☆43Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for w-generator-offline
Users that are interested in w-generator-offline are comparing it to the libraries listed below
Sorting:
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 7 months ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated 3 weeks ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆48May 24, 2025Updated 9 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆21Sep 28, 2024Updated last year
- AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files …☆23Jan 30, 2021Updated 5 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 3 years ago
- Automated Social Media Phishing Tool. Automated tool that allow us to hack accounts with 2FA Bypass.☆41Mar 10, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- 🛠️🐧 "All-in-One Linux Server Toolkit: Status Check + Access" 💥💻☆20Mar 18, 2025Updated 11 months ago
- scrap email from instagram user followers☆12Jul 21, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆34Jul 28, 2020Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- ☆18Nov 20, 2020Updated 5 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Do some DLL SideLoading magic☆90Sep 20, 2023Updated 2 years ago
- (CLI wrapper) Takes a list of URLs and retrieve screenshots of older versions stored on the Wayback Machine.☆41Jun 23, 2022Updated 3 years ago
- Timejam for Rolljam with Hackrf Portapack☆40Oct 19, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year