blackhatethicalhacking / EvilOSXLinks
An evil RAT (Remote Administration Tool) for macOS / OS X.
☆14Updated 6 years ago
Alternatives and similar repositories for EvilOSX
Users that are interested in EvilOSX are comparing it to the libraries listed below
Sorting:
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆29Updated 5 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 5 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 4 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- The New Hacking Framework☆18Updated 8 years ago
- ☆24Updated 5 years ago
- ☆36Updated 3 years ago
- An Instagram Open Source Intelligence Tool☆22Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆60Updated 9 years ago
- ☆12Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- scripts to setup environments for red/blue teams.☆16Updated last year
- Cheatsheet collection of Infosec tools☆15Updated 6 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 5 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆31Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Updated 7 years ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago