This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related purposes. There are some more things that I need to do and have commented in the code, if you have found ways then please do let me know. REMEMBER, PHISHING A PERSON FOR THEIR IMPORTANT USERNAME AND PASSWORD W…
☆18Mar 25, 2022Updated 4 years ago
Alternatives and similar repositories for windows-login-phish
Users that are interested in windows-login-phish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 4 years ago
- Django QuerySet.annotate(), aggregate(), extra() SQL 注入☆25May 31, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- 模拟QQ邮箱登录的钓鱼网站,数据可实时发送到手机上。☆10May 20, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 关于GadgetInspector的二开的一些思考和改进。☆18Sep 4, 2023Updated 2 years ago
- Cobalt Strike Team Server Password Brute Forcer☆29Aug 12, 2020Updated 5 years ago
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- 从cs4.2反编译后提取的web端键盘记录,记录web页面输入的所有文本内容。☆12Aug 16, 2021Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Smishing Botnets Going Viral in Iran☆10Feb 19, 2022Updated 4 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 3 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- go语言免杀shellcode☆19Dec 31, 2021Updated 4 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 4 years ago
- XMLRPC - RCE in MovableTypePoC☆21Mar 21, 2022Updated 4 years ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆26Mar 8, 2026Updated 2 months ago
- ☆20Mar 9, 2021Updated 5 years ago
- Javascript game using three.js☆12Nov 23, 2021Updated 4 years ago
- Red Team Server (RTS)☆16Apr 16, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- burp解密插件☆10Jun 9, 2023Updated 2 years ago
- Central Repo for Burp extensions☆27Dec 13, 2024Updated last year
- The C++ open source remote keylogger, hack windows and control mouse and keyboard remotely and bypass any antivirus☆19Apr 8, 2022Updated 4 years ago
- EmailVuln☆15Feb 4, 2019Updated 7 years ago
- Android-PIN-Bruteforce☆17Sep 12, 2021Updated 4 years ago
- CVE-2022-30780 - lighttpd remote denial of service☆17Mar 16, 2024Updated 2 years ago
- 一个自动挖掘漏洞的框架,日后会发展成强大的信息收集+漏洞挖掘脚本!☆26May 27, 2022Updated 3 years ago
- A low/zero interaction ssh authentication logging honeypot☆26Mar 8, 2026Updated 2 months ago
- Personally developed tools for buffer overflow attacks☆24Sep 25, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- CVE-2022-24734 PoC☆48May 8, 2022Updated 4 years ago
- frida snippet generator firefox extension for developer.android.com☆23Mar 2, 2022Updated 4 years ago
- An uploader honeypot designed to look like poor website security.☆29Apr 19, 2025Updated last year
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Nov 11, 2022Updated 3 years ago