benb116 / Gone-Phishing
A phishing attack for Macs that copies the victim's password and keychain to the Public folder.
☆45Updated 7 years ago
Related projects: ⓘ
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- ssh session type for metasploit☆97Updated last year
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ☆23Updated this week
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆42Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- A tool for harvesting sysadmin credentials in Linux☆18Updated 2 months ago
- ☆17Updated 9 years ago
- A BurpSuite extension for lair☆27Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆18Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- ☆18Updated this week
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 7 years ago
- Projects and POCs☆58Updated 10 years ago
- ☆63Updated this week
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Updated 8 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 9 years ago