0dayCTF / Autofill_DangerLinks
Autofill Phishing
☆74Updated 7 months ago
Alternatives and similar repositories for Autofill_Danger
Users that are interested in Autofill_Danger are comparing it to the libraries listed below
Sorting:
- Bookmarklet to find endpoints easily with one click☆62Updated last year
- capNcook - a dark web exploration tool☆73Updated last year
- Turning smart lights into Wifi Hacking implants.☆126Updated 5 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 5 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆172Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Analyze your tryhackme progress!☆12Updated last year
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆46Updated last year
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆17Updated 2 months ago
- capNcook - a dark web exploration tool☆105Updated 10 months ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated last week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆310Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆196Updated 4 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 11 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆134Updated 6 months ago
- A python script that look for hikvision vulnerable cams with a backdoor☆23Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆94Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆36Updated 3 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- What the name says....☆101Updated 10 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 4 months ago
- Remake of CVE-2020-9484 by Pentestical☆20Updated 10 months ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 4 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆68Updated 9 months ago
- WiFi Cha0s t00lkit xox☆47Updated 3 weeks ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆36Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆112Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆30Updated 3 months ago