AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-99.57%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-98.13%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-98.86%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (-80.01%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+154.2%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-97.73%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-98.2%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+144.68%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (-94.17%)
chkdfrontCheck Domain Fronting (chkdfront) - It checks if your domain fronting is working
Stars: ✭ 42 (-99.01%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-99.67%)
RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (-98.67%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-99.15%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (-95.26%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-90.81%)
Malleable-C2-ProfilesMalleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
Stars: ✭ 168 (-96.02%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-99.19%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (-99.57%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (-92.99%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-97.92%)
Redteam ResearchCollection of PoC and offensive techniques used by the BlackArrow Red Team
Stars: ✭ 330 (-92.19%)
FreeFire-PhishingFree Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (-96.68%)
ElliotA pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-99.46%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-91.83%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-92.21%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (-8.64%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (-87.12%)
EspooferAn email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻
Stars: ✭ 273 (-93.54%)
LordPhishThe most complete phishing tool
Stars: ✭ 158 (-96.26%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-93.56%)
UUBUIAccess UAC Bypass using token duplication and keyboard events
Stars: ✭ 22 (-99.48%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-93.89%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (-9.78%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-99.48%)
CamHackerCamera phishing tool. If anyone opens link generated by CamHacker and permits camera access his/her photo will be captured!
Stars: ✭ 280 (-93.37%)
Impost3r👻Impost3r -- A linux password thief
Stars: ✭ 355 (-91.59%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-91.93%)
ModlishkaModlishka. Reverse Proxy.
Stars: ✭ 3,634 (-13.95%)
StreamingphishPython-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
Stars: ✭ 271 (-93.58%)
ResourcesNo description or website provided.
Stars: ✭ 38 (-99.1%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-93.65%)
SpectreA simple phishing tool that can phish almost any website
Stars: ✭ 57 (-98.65%)
blacklistA dataset of various malicious cryptocurrency-related URLs and Twitter profiles
Stars: ✭ 34 (-99.19%)
Awesome Windows Red Team A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Stars: ✭ 308 (-92.71%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (-26.02%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-93.8%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-98.6%)