An evil RAT (Remote Administration Tool) for macOS / OS X.
☆14Jan 18, 2019Updated 7 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below
Sorting:
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Jul 11, 2019Updated 6 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆28Mar 2, 2019Updated 7 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Nov 8, 2018Updated 7 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- An Instagram Open Source Intelligence Tool☆21Jul 26, 2019Updated 6 years ago
- https://github.com/xHak9x/fbi.git☆11Nov 17, 2019Updated 6 years ago
- A Programmer☆14Dec 20, 2025Updated 2 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Nov 3, 2018Updated 7 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- Post from vim directly to slack☆13Apr 27, 2021Updated 4 years ago
- Taskwarrior to LaTeX☆12Jun 22, 2013Updated 12 years ago
- Node.js implementation of the PirateBox Server inspired by David Darts☆15Dec 8, 2015Updated 10 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 7 months ago
- The TaskWarrior visualisation and extension for team management☆12May 26, 2016Updated 9 years ago
- Like the British said☆12Nov 15, 2023Updated 2 years ago
- Flipper Zero SubGhz Jamming File☆16Oct 27, 2024Updated last year
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing☆48Jan 18, 2026Updated last month
- The Xapi Project's XenAPI Server - **Forked only to contribute PRs upstream**☆14Updated this week
- A program for brute force the 4 digit netflix pin code with a flipper zero☆17Jul 6, 2025Updated 7 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Micro FEs Simplified Starter Kit☆12Dec 14, 2020Updated 5 years ago
- FaceNiff Key Generator☆17Nov 28, 2022Updated 3 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Jun 13, 2022Updated 3 years ago
- Flipper Zero-like device for pentesting and fun :)☆14Nov 2, 2024Updated last year
- Typescript utility that displays currently active taskwarrior task in i3status bar.☆16Jan 12, 2017Updated 9 years ago
- Integrate proxyrack.com API service using multiple languages☆15Sep 30, 2022Updated 3 years ago
- Ultimaker Cura Wood Grain Post Processing Script☆12Apr 10, 2019Updated 6 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- CSS Keylogger Proof of Concept☆14Feb 21, 2018Updated 8 years ago