JohnHammond / recaptcha-phishLinks
Phishing with a fake reCAPTCHA
☆564Updated 9 months ago
Alternatives and similar repositories for recaptcha-phish
Users that are interested in recaptcha-phish are comparing it to the libraries listed below
Sorting:
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆499Updated 5 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆300Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆786Updated 3 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆352Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆398Updated 2 weeks ago
- Embed a payload inside a PNG file☆324Updated 8 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆951Updated last month
- This is for Ethical Use only.☆405Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆444Updated last year
- C2 infrastructure over Microsoft Teams.☆689Updated 5 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,108Updated last week
- Make BASH stealthy and hacker friendly with lots of bash functions☆259Updated 3 weeks ago
- ☆296Updated last year
- ☆543Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆324Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆308Updated 3 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆243Updated 8 months ago
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆753Updated this week
- ☆325Updated this week
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆514Updated 10 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆747Updated 5 months ago
- Because AV evasion should be easy.☆752Updated 7 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆597Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆175Updated 3 months ago
- Dominate Active Directory with PowerShell.☆989Updated this week
- Matkap - hunt down malicious Telegram bots☆623Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆388Updated 5 months ago
- A fast WordPress plugin enumeration tool☆522Updated last week
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆418Updated 3 weeks ago