one-time use token phishing toolkit
☆12May 30, 2020Updated 5 years ago
Alternatives and similar repositories for otu-plz
Users that are interested in otu-plz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- A realtime bot to bridge a slack.com channel to IRC☆11Sep 16, 2017Updated 8 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- A minimalist standard library for writing Makefiles.☆16Nov 17, 2024Updated last year
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- PE file format reader in JavaScript☆26Apr 10, 2019Updated 6 years ago
- Medium post example file☆14Mar 18, 2023Updated 3 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- Library for the WEMOS Mini Matrix LED Shield compatible with Adafruit GFX Library.☆11Jun 22, 2020Updated 5 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- A collection of malicious tools I wrote when playing black team for an invitational CCDC competition☆23Mar 12, 2015Updated 11 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Python, Tor, Stem, Privoxy crawler of web site(s).☆12Sep 29, 2014Updated 11 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- service to convert nfcapd files clickhouse as they are created☆10Mar 22, 2025Updated last year
- ☆21Feb 22, 2025Updated last year
- Packer, Terraform, and Ansible code to run a three node clustered Proxmox Home Lab☆22Apr 15, 2024Updated last year
- Arduino (ino) sketch to read / translate DSMR22 reports from Landis Gyr E350 (inverted serial protocol)☆11Jul 27, 2018Updated 7 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Simple backdoor written in .bat for windows that use NetCat☆18Aug 6, 2016Updated 9 years ago
- Running TinixOS in your browser! Based on copy/v86 (x86 virtualization in JavaScript).☆17Nov 8, 2024Updated last year
- Tools Hack facebook , fitur : Bruteforce,Yahoo cloning,Bot ,Picture Guard .dll☆13Aug 2, 2019Updated 6 years ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- A library that makes developing Swing applications on Jython much less painful☆16Jan 23, 2018Updated 8 years ago
- Reflective/DOM XSS scanner built on casperJS☆81Oct 21, 2014Updated 11 years ago
- Lewis & Clark CCDC Team Resources☆17Mar 27, 2015Updated 10 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago