BlacksunLabs / LockScreamLinks
macOS Client-Side Phishing lock screen payload
☆129Updated 6 years ago
Alternatives and similar repositories for LockScream
Users that are interested in LockScream are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆92Updated 7 years ago
 - Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
 - Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
 - macOS Privilege Escalation Helper☆138Updated 8 months ago
 - ☆81Updated 6 years ago
 - rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
 - Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
 - The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
 - Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
 - Wi-Fi Covert Channel Chat demo application☆71Updated 8 years ago
 - A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
 - A repo full of example gscripts☆101Updated 6 years ago
 - Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
 - Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
 - Fully-featured spear-phishing toolkit - web front-end☆52Updated 9 months ago
 - List of Awesome Offensive Tools written in GO☆201Updated 6 years ago
 - Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆122Updated 4 years ago
 - A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 6 years ago
 - Scan for and exploit Consul agents☆40Updated 6 years ago
 - Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
 - Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆200Updated 3 years ago
 - For importing, searching, and managing public password breach data☆161Updated 2 years ago
 - A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆80Updated 7 years ago
 - A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
 - Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
 - Competition Infrastructure Management☆87Updated 3 years ago
 - C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
 - Rogue Access Point Detector☆37Updated last year
 - Responsive Command and Control System☆102Updated 3 years ago
 - Parser for data dumps Collection #1 / Collection #2-5☆147Updated 6 years ago