A simple demo of phishing by abusing the browser autofill feature
☆1,484Jun 5, 2021Updated 4 years ago
Alternatives and similar repositories for browser-autofill-phishing
Users that are interested in browser-autofill-phishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,458Nov 26, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,323Jul 27, 2021Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,420Jan 9, 2024Updated 2 years ago
- A demo of overriding what's in a person's clipboard☆1,436Jan 2, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 📡 A python program to create a fake AP and sniff data.☆1,692Nov 3, 2019Updated 6 years ago
- A very simple Chrome Extension that displays the automated image tags that Facebook has generated for your images☆1,488Nov 9, 2021Updated 4 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,628Apr 18, 2024Updated 2 years ago
- Simple reverse ICMP shell☆41May 17, 2013Updated 12 years ago
- Chrome extension and Express server that exploits keylogging abilities of CSS.☆3,243Feb 20, 2018Updated 8 years ago
- Docker container to run PoisonTap☆15Dec 8, 2016Updated 9 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,924Mar 14, 2017Updated 9 years ago
- Phishing Scenarios Used for Phishing Frenzy☆207Oct 30, 2019Updated 6 years ago
- Self hosted streaming media server. https://docs.streama-project.com/☆9,811Apr 19, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Putting Atom in the browser☆1,172Mar 27, 2019Updated 7 years ago
- Sniffing browser history using HSTS☆937Aug 5, 2017Updated 8 years ago
- Create On Demand Disposable OpenVPN Endpoints on AWS.☆2,014Mar 23, 2026Updated last month
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆630Oct 16, 2018Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,119Jul 3, 2022Updated 3 years ago
- Shared lists of problem domains people may want to block with hosts files☆4,572Oct 31, 2024Updated last year
- Community guide to securing and improving privacy on macOS.☆22,396Jan 2, 2026Updated 3 months ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Aug 14, 2022Updated 3 years ago
- See what a program does before deciding whether you really want it to happen (NO LONGER MAINTAINED)☆6,324Jan 22, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Listen to music generated by events happening across GitHub 🎷☆1,754May 25, 2025Updated 11 months ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- A CLI dashboard for webpack dev server☆14,030Aug 12, 2024Updated last year
- Interactive cli tool for HTTP inspection☆10,717Oct 27, 2025Updated 6 months ago
- Computer Science Cheatsheets.☆1,598Dec 3, 2020Updated 5 years ago
- Find out which of your dependencies are slowing you down 🐢☆2,861Jul 24, 2023Updated 2 years ago
- Generate regular expressions that match a set of strings☆3,428Feb 15, 2024Updated 2 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,226Feb 6, 2022Updated 4 years ago
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,462Nov 3, 2018Updated 7 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 6 years ago
- The magic of Google Autocomplete while you're typing. Anywhere.☆1,539May 7, 2023Updated 2 years ago
- Security Guide for Developers☆21,084Aug 30, 2025Updated 8 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,276Nov 20, 2025Updated 5 months ago
- A list of (almost) all headless web browsers in existence☆6,542Oct 12, 2025Updated 6 months ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago