A fake login page for use in a phishing attack
☆35Mar 21, 2017Updated 8 years ago
Alternatives and similar repositories for Fake-Login-Page
Users that are interested in Fake-Login-Page are comparing it to the libraries listed below
Sorting:
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Jan 30, 2023Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- This repository for training application security.☆26Aug 9, 2019Updated 6 years ago
- Arduino based hardware serial sniffer☆17Aug 23, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- CIPSEC SDR Jammer Detector☆17Jun 11, 2019Updated 6 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago