benb116 / Gone-Phishing-2View external linksLinks
New and Improved
☆17May 7, 2016Updated 9 years ago
Alternatives and similar repositories for Gone-Phishing-2
Users that are interested in Gone-Phishing-2 are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- The JSidle Javascript packer☆23Sep 16, 2010Updated 15 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Meteor package for client + server side IMSI-catcher detection.☆21Jun 9, 2016Updated 9 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆75Aug 30, 2016Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- A mirror of "103_top_shell.rar" since the original disappeared.☆25Sep 27, 2015Updated 10 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Feb 5, 2017Updated 9 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Automatically spin up infra for phishing☆64Feb 1, 2020Updated 6 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Jul 20, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Jun 10, 2022Updated 3 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 7 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Jul 5, 2017Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- Checklist and tools for increasing security of Apache Airflow☆32May 7, 2021Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35May 20, 2020Updated 5 years ago