ReptilianPride / windows-login-phishView external linksLinks
This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related purposes. There are some more things that I need to do and have commented in the code, if you have found ways then please do let me know. REMEMBER, PHISHING A PERSON FOR THEIR IMPORTANT USERNAME AND PASSWORD W…
☆18Mar 25, 2022Updated 3 years ago
Alternatives and similar repositories for windows-login-phish
Users that are interested in windows-login-phish are comparing it to the libraries listed below
Sorting:
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- Cobalt Strike Team Server Password Brute Forcer☆29Aug 12, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ysoserial for 1nhann☆11Sep 26, 2022Updated 3 years ago
- 模拟QQ邮箱登录的钓鱼网站,数据可实时发送到手机上。☆10May 20, 2022Updated 3 years ago
- Django QuerySet.annotate(), aggregate(), extra() SQL 注入☆24May 31, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- A script to download OUI data from the IEEE and parse it into the nmap-mac-prefixes file so Nmap has the latest OUI data.☆12Jun 8, 2022Updated 3 years ago
- 关于GadgetInspector的二开的一些思考和改进。☆18Sep 4, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- php webshell bypass D盾、safedog、360、火绒等,仅支持php7☆18Aug 25, 2025Updated 5 months ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated last year
- 从cs4.2反编译后提取的web端键盘记录,记录web页面输入的所有文本内容。☆11Aug 16, 2021Updated 4 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated last week
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- go语言免杀shellcode☆19Dec 31, 2021Updated 4 years ago
- A python library to interact with Pwndoc instances for pentest reports generation☆22May 19, 2025Updated 8 months ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- ☆21Jul 7, 2023Updated 2 years ago
- 一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具/A simple tool targeted at shiro framework attacks with ysoserial.☆24Jul 6, 2022Updated 3 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆26Feb 11, 2025Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Jun 18, 2022Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- 一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!☆26May 27, 2022Updated 3 years ago