0dayCTF / Autofill_Danger
Autofill Phishing
☆64Updated 3 months ago
Alternatives and similar repositories for Autofill_Danger:
Users that are interested in Autofill_Danger are comparing it to the libraries listed below
- capNcook - a dark web exploration tool☆64Updated 11 months ago
- Turning smart lights into Wifi Hacking implants.☆118Updated last month
- Simple HTTP listener for security testing☆15Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆51Updated 10 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆43Updated 3 years ago
- ☆14Updated 8 months ago
- Remake of CVE-2020-9484 by Pentestical☆19Updated 6 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆166Updated 9 months ago
- 🤖 The Modern Port Scanner 🤖☆17Updated 3 years ago
- Automate installation of extra pentest tools on Kali Linux☆52Updated 3 years ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆73Updated 8 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆43Updated 8 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- ☆20Updated last year
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆22Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- A Powerful Intruder written in Python☆11Updated 3 years ago
- Lists various tools used in hardware hacking.☆24Updated 2 weeks ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- Stuff about it-security that might be good to know☆20Updated 5 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆39Updated 3 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆57Updated 7 months ago
- A web based OSINT ressource and tool☆85Updated 3 weeks ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 8 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆17Updated 5 years ago