An evil RAT (Remote Administration Tool) for macOS / OS X.
☆14Jan 18, 2019Updated 7 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below
Sorting:
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- An Instagram Open Source Intelligence Tool☆21Jul 26, 2019Updated 6 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- A Programmer☆14Dec 20, 2025Updated 3 months ago
- Node.js implementation of the PirateBox Server inspired by David Darts☆15Dec 8, 2015Updated 10 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Simple python script to generate an ad-free hosts file☆11Sep 15, 2016Updated 9 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Jan 13, 2022Updated 4 years ago
- ☆16Aug 29, 2025Updated 6 months ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- PhotoViewer Swift - paging & zooming☆17Mar 10, 2017Updated 9 years ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆23May 27, 2024Updated last year
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Dec 10, 2019Updated 6 years ago
- The fastest Malware Check on iOS!☆14Jun 30, 2020Updated 5 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆18Jan 16, 2024Updated 2 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Jun 13, 2022Updated 3 years ago
- FaceNiff Key Generator☆17Nov 28, 2022Updated 3 years ago
- Micro FEs Simplified Starter Kit☆12Dec 14, 2020Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- ☆13Dec 7, 2022Updated 3 years ago
- A framework for BREACH and other compression-based crypto attacks☆14Dec 7, 2017Updated 8 years ago
- Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing☆48Jan 18, 2026Updated 2 months ago
- Ultimaker Cura Wood Grain Post Processing Script☆12Apr 10, 2019Updated 6 years ago