BlacksunLabs / LockScream
macOS Client-Side Phishing lock screen payload
☆127Updated 5 years ago
Alternatives and similar repositories for LockScream:
Users that are interested in LockScream are comparing it to the libraries listed below
- Rogue AP killer☆89Updated 7 years ago
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆175Updated 4 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Pypykatz server☆125Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated last month
- Python3 script to parse txt files containing Mimikatz output☆99Updated 4 years ago
- macOS Offensive Tools☆265Updated last year
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- macOS Privilege Escalation Helper☆140Updated this week
- A repo full of example gscripts☆99Updated 5 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- Pentest dropbox setup scripts for Kali Linux☆88Updated 9 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 2 years ago
- Evil client portion of EAP relay attack☆196Updated last year
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- ☆219Updated 8 months ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆115Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆213Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year