ReptilianPride / windows-login-phishLinks
This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related purposes. There are some more things that I need to do and have commented in the code, if you have found ways then please do let me know. REMEMBER, PHISHING A PERSON FOR THEIR IMPORTANT USERNAME AND PASSWORD W…
☆18Updated 3 years ago
Alternatives and similar repositories for windows-login-phish
Users that are interested in windows-login-phish are comparing it to the libraries listed below
Sorting:
- Microsoft Exchange password spray tool with proxy support.☆39Updated 4 years ago
- A testing Red Team Infrastructure created with Docker☆32Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 5 years ago
- Windows Oracle Database Attack Toolkit☆81Updated 3 years ago
- Tomcat backdoor based on CS blog☆27Updated 2 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 4 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Updated 2 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Updated 3 years ago
- Case for CVE-2022-30778☆23Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆26Updated 2 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 7 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 4 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆40Updated 3 years ago
- ☆53Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- ☆14Updated 3 years ago
- Very Easy Relative Backdoor Application☆12Updated 4 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆13Updated last year
- CVE-2023-20198 & 0Day Implant Scanner☆32Updated last week
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Updated 2 years ago
- CVE-2022-24734 PoC☆48Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 5 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago