☆11Apr 30, 2015Updated 10 years ago
Alternatives and similar repositories for MacroSploit
Users that are interested in MacroSploit are comparing it to the libraries listed below
Sorting:
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- A basic Django project that implements an IVR telephony system with Twilio☆12Jul 17, 2014Updated 11 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Sample application demonstrating automated voice surveys with Twilio and Ruby on Rails☆10Jul 13, 2023Updated 2 years ago
- A More or less Random Collection of Scripts for security Testing.☆64May 30, 2022Updated 3 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A phishing attack for Macs that copies the victim's password and keychain to the Public folder.☆45Dec 18, 2016Updated 9 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Jan 11, 2025Updated last year
- FPGA controller for SSD1306 OLED module on SPI. Optimised for GOWIN FPGA☆15Oct 11, 2018Updated 7 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Nov 24, 2024Updated last year
- Automated Survey application built on Rails☆11Jul 19, 2023Updated 2 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- ☆80Sep 27, 2015Updated 10 years ago
- Asynchronous DNS-over-HTTPS client for Python☆15Dec 18, 2017Updated 8 years ago
- SysCon14 release☆55Jun 24, 2017Updated 8 years ago
- Python, Tor, Stem, Privoxy crawler of web site(s).☆12Sep 29, 2014Updated 11 years ago
- A USB RUBBER DUCKY GUI! A RoR app as a simple GUI wrapper for the Duck Encoder. Have it configured to serve remotely and you have a way o…☆30Dec 11, 2014Updated 11 years ago
- Zero font obfuscation for your html letters. Multiple alphabets☆11Apr 11, 2021Updated 4 years ago
- Project Completed☆11Dec 5, 2019Updated 6 years ago
- Simple 6809 emulator, adapted from work by Jerome Thoen☆11Jul 8, 2016Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A remote access trojan over DNS☆98Dec 23, 2015Updated 10 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- A utility for sharing snippets easily☆11Dec 8, 2022Updated 3 years ago
- Arduino (ino) sketch to read / translate DSMR22 reports from Landis Gyr E350 (inverted serial protocol)☆11Jul 27, 2018Updated 7 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- FPGA Tang Nano 20K implemention of V9958 128K for Yellow MSX Boards (forked from https://github.com/lfantoniosi/tn_vdp)☆24Feb 17, 2026Updated last month
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago