azizaltuntas / CamelishingView external linksLinks
Social Engineering Tool
☆189Jul 24, 2018Updated 7 years ago
Alternatives and similar repositories for Camelishing
Users that are interested in Camelishing are comparing it to the libraries listed below
Sorting:
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆277Aug 24, 2023Updated 2 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Mar 6, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Auto Root Exploit Tool☆534Jun 15, 2023Updated 2 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- ☆99May 3, 2018Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆168May 23, 2018Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- CVE-2018-10933 very simple POC☆126Oct 23, 2018Updated 7 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- 漏洞利用框架模块分享仓库☆348Oct 8, 2019Updated 6 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- A simple bash based metasploit automation tool!☆125Feb 16, 2023Updated 3 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆236Jan 15, 2019Updated 7 years ago