New and Improved
☆17May 7, 2016Updated 9 years ago
Alternatives and similar repositories for Gone-Phishing-2
Users that are interested in Gone-Phishing-2 are comparing it to the libraries listed below
Sorting:
- A phishing attack for Macs that copies the victim's password and keychain to the Public folder.☆45Dec 18, 2016Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- The JSidle Javascript packer☆23Sep 16, 2010Updated 15 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Meteor package for client + server side IMSI-catcher detection.☆21Jun 9, 2016Updated 9 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- Files that relate to the Wordfence report on DHS Grizzly Steppe data☆21Jan 8, 2017Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Jul 20, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Jul 5, 2017Updated 8 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated 2 months ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Checklist and tools for increasing security of Apache Airflow☆32May 7, 2021Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago