compewter / CopyCat
Universal MITM web server
☆107Updated 7 years ago
Alternatives and similar repositories for CopyCat:
Users that are interested in CopyCat are comparing it to the libraries listed below
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆133Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆112Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆85Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 7 years ago
- ☆53Updated 8 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- A python script for obfuscating wireless networks☆77Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 6 months ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- ☆61Updated 7 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago