A fake login page for use in a phishing attack
☆35Mar 21, 2017Updated 9 years ago
Alternatives and similar repositories for Fake-Login-Page
Users that are interested in Fake-Login-Page are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆11Mar 19, 2017Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- ☆11Aug 1, 2016Updated 9 years ago
- ☆18Dec 7, 2021Updated 4 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- A curated list of websites and apps to help you practice hacking☆24Oct 15, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 针对于Jenkins控制台用户的暴力破解工具☆33Jan 12, 2021Updated 5 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago
- Tuuu theme for Typecho☆10Mar 20, 2019Updated 7 years ago
- 右键检测图片是否存在Exif 漏洞☆31Mar 27, 2023Updated 3 years ago