New and Improved
☆17May 7, 2016Updated 9 years ago
Alternatives and similar repositories for Gone-Phishing-2
Users that are interested in Gone-Phishing-2 are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- The JSidle Javascript packer☆23Sep 16, 2010Updated 15 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated 2 weeks ago
- Files that relate to the Wordfence report on DHS Grizzly Steppe data☆21Jan 8, 2017Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Jul 20, 2017Updated 8 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Jul 5, 2017Updated 8 years ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Checklist and tools for increasing security of Apache Airflow☆32May 7, 2021Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- Collection of tools for privesc on Linux☆34Aug 28, 2013Updated 12 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Sep 29, 2014Updated 11 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- Vulnerability Reports by Aleph Research☆36Mar 10, 2024Updated 2 years ago