macOS Client-Side Phishing lock screen payload
☆129Apr 14, 2019Updated 6 years ago
Alternatives and similar repositories for LockScream
Users that are interested in LockScream are comparing it to the libraries listed below
Sorting:
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆110May 14, 2018Updated 7 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18May 3, 2024Updated last year
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Jun 26, 2018Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- A OS X crypto ransomware PoC☆89Sep 4, 2015Updated 10 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214May 5, 2022Updated 3 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆272Jul 26, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago