JoulioK / Phishing_Kits
Exposing phishing kits, creators and malicious actors.
☆50Updated 2 years ago
Alternatives and similar repositories for Phishing_Kits:
Users that are interested in Phishing_Kits are comparing it to the libraries listed below
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆98Updated 7 years ago
- ☆51Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆18Updated 6 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Automated Tools Pentest☆7Updated last year
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆82Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Backdoor en powershell vía Telegram☆29Updated 7 years ago
- ☆13Updated last year
- HTTP botnet☆61Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Fully-featured spear-phishing toolkit - web front-end☆49Updated 3 weeks ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 3 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆97Updated 2 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆79Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆65Updated 5 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 4 years ago