A fake login page for use in a phishing attack
☆35Mar 21, 2017Updated 9 years ago
Alternatives and similar repositories for Fake-Login-Page
Users that are interested in Fake-Login-Page are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LibrePilot/OpenPilot Wiki☆15Dec 27, 2015Updated 10 years ago
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Dec 9, 2021Updated 4 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆11Mar 19, 2017Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- ☆11Aug 1, 2016Updated 9 years ago
- ☆18Dec 7, 2021Updated 4 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- This repository for training application security.☆26Aug 9, 2019Updated 6 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Jan 30, 2023Updated 3 years ago
- awesome resources about cloud security 🐿☆20Dec 2, 2021Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 4 months ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- 带回显版本的漏洞利用脚本☆25Mar 5, 2021Updated 5 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- A curated list of websites and apps to help you practice hacking☆23Oct 15, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- An Extended, Modulair, Host Discovery Framework☆42Jan 22, 2019Updated 7 years ago
- 针对于Jenkins控制台用户的暴力破解工具☆33Jan 12, 2021Updated 5 years ago
- Porting the Pineapple to the Raspberry Pi☆85Jun 27, 2013Updated 12 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago