benb116 / Gone-Phishing
A phishing attack for Macs that copies the victim's password and keychain to the Public folder.
☆45Updated 8 years ago
Alternatives and similar repositories for Gone-Phishing
Users that are interested in Gone-Phishing are comparing it to the libraries listed below
Sorting:
- New and Improved☆17Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- ☆17Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Extraction of iMessage Data via XSS☆53Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- exploit for CVE-2018-4193☆70Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago