blackhatethicalhacking / EvilOSXLinks
An evil RAT (Remote Administration Tool) for macOS / OS X.
☆14Updated 7 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below
Sorting:
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- A toolkit to attack Office365☆16Updated 6 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 8 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- Automated script to run all modules for a specified list of domains, netblocks or company name☆19Updated 3 years ago
- ☆12Updated 5 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- ☆25Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 6 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆19Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14Updated 6 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Updated 8 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago