wcrooker / PhishHookView external linksLinks
A modern GoPhish fork with improved tracking accuracy and smarter detection.
☆78Feb 6, 2026Updated last week
Alternatives and similar repositories for PhishHook
Users that are interested in PhishHook are comparing it to the libraries listed below
Sorting:
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Rust crate to obfuscate strings and byte arrays so they are not in memory when not in use.☆19Dec 23, 2025Updated last month
- ☆14Dec 5, 2024Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆34Feb 6, 2026Updated last week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42May 31, 2024Updated last year
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated 10 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated last month
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 6 months ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆82Updated this week
- ☆18Dec 12, 2020Updated 5 years ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago
- adws enumeration bof☆162Oct 2, 2025Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆55Jan 17, 2026Updated 3 weeks ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- ☆48Dec 21, 2025Updated last month
- AppLocker-Based EDR Neutralization☆302Dec 19, 2025Updated last month
- ☆137Nov 17, 2025Updated 2 months ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆146Jul 17, 2025Updated 6 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆63Dec 15, 2025Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- CPL remote trigger☆43Dec 28, 2025Updated last month
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 6 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Nov 24, 2024Updated last year
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago