An evil RAT (Remote Administration Tool) for macOS / OS X.
☆14Jan 18, 2019Updated 7 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Jul 30, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- An Instagram Open Source Intelligence Tool☆21Jul 26, 2019Updated 6 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- A tool to abuse Exchange services☆18Jun 21, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- VoIPmonitor sniffer sources☆20Nov 14, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆33Jan 24, 2026Updated 2 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆21Oct 31, 2018Updated 7 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Simple python script to generate an ad-free hosts file☆11Sep 15, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆68Jan 13, 2022Updated 4 years ago
- Network Security II - Secure codding☆10Jun 5, 2018Updated 7 years ago
- Integrate proxyrack.com API service using multiple languages☆15Sep 30, 2022Updated 3 years ago
- ☆16Aug 29, 2025Updated 7 months ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- PhotoViewer Swift - paging & zooming☆17Mar 10, 2017Updated 9 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago
- A script to install Gentoo | Void Linux.☆14Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13May 12, 2019Updated 6 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 8 months ago
- R Reference Card☆25Jan 11, 2013Updated 13 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Dec 10, 2019Updated 6 years ago
- The fastest Malware Check on iOS!☆14Jun 30, 2020Updated 5 years ago