JohnHammond / recaptcha-phish
Phishing with a fake reCAPTCHA
☆472Updated 5 months ago
Alternatives and similar repositories for recaptcha-phish:
Users that are interested in recaptcha-phish are comparing it to the libraries listed below
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆477Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆653Updated 9 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆360Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆321Updated 4 months ago
- ☆285Updated 7 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 7 months ago
- Embed a payload inside a PNG file☆289Updated 3 months ago
- ☆529Updated 10 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆231Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆338Updated 2 months ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated 11 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆313Updated last month
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆546Updated 7 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆724Updated last month
- Make BASH stealthy and hacker friendly with lots of bash functions☆233Updated this week
- Tool to decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface with path validation and encryption protection…☆324Updated 3 months ago
- Because AV evasion should be easy.☆661Updated 2 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆504Updated 6 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆368Updated 5 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆119Updated last month
- Header Exploitation HTTP☆395Updated last week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆477Updated last week
- This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be…☆200Updated last week
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆940Updated 6 months ago
- Automation tool to testing and confirm the xss vulnerability.☆213Updated last week
- Complete list of LPE exploits for Windows (starting from 2023)☆735Updated last week
- This repository presents a proof-of-concept of CVE-2023-7028☆240Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆391Updated 2 weeks ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆504Updated 6 months ago