brav0hax / easy-credsLinks
☆283Updated 11 years ago
Alternatives and similar repositories for easy-creds
Users that are interested in easy-creds are comparing it to the libraries listed below
Sorting:
- Create fake AP in Kali with 1 command☆269Updated 10 years ago
- Metasploit AV Evasion Tool☆256Updated 10 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆139Updated 9 years ago
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- CookieCatcher☆145Updated 12 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆198Updated 7 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Updated 7 years ago
- A JBoss script for obtaining remote shell access☆177Updated 5 years ago
- Offensive DNS server☆323Updated 4 years ago
- Python framework for IT security tools☆268Updated 8 years ago
- minimal script to help find script into the nse database☆133Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 7 years ago
- Created by Jin Qian via the GitHub Connector☆436Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- SpiderLabs shared Nmap Tools☆229Updated 5 years ago
- metasploitHelper☆251Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- ☆338Updated 9 years ago
- Mass exploitation tool in python☆205Updated 7 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆142Updated 3 months ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆379Updated 8 years ago
- intercepting kali router☆442Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 8 years ago
- [unmaintained] Post-exploitation tool☆181Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 3 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192Updated 6 years ago