yashrao / SMS-Phishing-AttackerView external linksLinks
☆33May 11, 2021Updated 4 years ago
Alternatives and similar repositories for SMS-Phishing-Attacker
Users that are interested in SMS-Phishing-Attacker are comparing it to the libraries listed below
Sorting:
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- ☆12Nov 3, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- ☆36Oct 16, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated last month
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆22Oct 31, 2024Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 5 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- A Terraform module for creating a Mailgun domain, Route53 Zone, and corresponding DNS records☆21Nov 23, 2019Updated 6 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆12Apr 8, 2021Updated 4 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆22Dec 17, 2021Updated 4 years ago
- ☆21Feb 27, 2021Updated 4 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago