☆106Dec 8, 2023Updated 2 years ago
Alternatives and similar repositories for Phishing-campaigns
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- ☆39Nov 24, 2022Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- ☆12Jun 12, 2021Updated 4 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆13Nov 25, 2022Updated 3 years ago
- OffSec OSINT Pentest/RedTeam Tools☆1,145Mar 9, 2026Updated 3 weeks ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- ☆29Aug 8, 2023Updated 2 years ago
- 📨 Quick tool to finds and extract email addresses from a body of text☆12Apr 15, 2023Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- View emails in Discord using Cloudflare Email Routing☆10Dec 15, 2023Updated 2 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆189Jan 30, 2023Updated 3 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- ☆16May 20, 2022Updated 3 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 7 years ago
- Monitor changes in Active Directory with replication metadata☆91Jul 9, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆568Mar 28, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Secretsdump C# version only supporting local (live) operation☆55Apr 20, 2025Updated 11 months ago
- Silent file loader☆14Apr 24, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- My attempt to turn Emacs into VSCode☆10May 19, 2025Updated 10 months ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- This script allows you to quickly search for terms on Pastebin using various search engines. It supports multiple browsers and handles sp…☆38Mar 4, 2026Updated 3 weeks ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆32Oct 3, 2025Updated 5 months ago
- ☆57Mar 25, 2024Updated 2 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆191Mar 4, 2021Updated 5 years ago
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago