benb116 / Gone-Phishing
A phishing attack for Macs that copies the victim's password and keychain to the Public folder.
☆45Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Gone-Phishing
- New and Improved☆16Updated 8 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 5 years ago
- Materials from presentation☆20Updated 8 years ago
- ☆12Updated 10 years ago
- Extraction of iMessage Data via XSS☆52Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆49Updated 3 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆38Updated 7 years ago
- OS X rootkit loader version #1☆18Updated 9 years ago
- ssh session type for metasploit☆97Updated last year
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- log file scrubber☆15Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆18Updated 4 months ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- Network aware keylogger: broadcasting on your local area network.☆20Updated 11 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Decrypts local iOS backups and recreates file system, with a framework for automatically extracting useful information☆40Updated 9 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago