An MITM based Social Engineering (Phishing)attack POC!
☆10Mar 25, 2014Updated 12 years ago
Alternatives and similar repositories for mitm-phishing-poc
Users that are interested in mitm-phishing-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jun 6, 2017Updated 8 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Haxxis Visualization System☆26May 22, 2017Updated 8 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Deploy telegram bot server in github workflows.☆17Jan 12, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Remote Administration Tool made in golang language.☆12Aug 7, 2023Updated 2 years ago
- Projects from the Elektron Analog Rytm Mk2☆12Jan 11, 2026Updated 3 months ago
- Automated Social Media Phishing Tool. Automated tool that allow us to hack accounts with 2FA Bypass.☆44Mar 10, 2024Updated 2 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- Remote Access Tool written in VBNET☆17Sep 8, 2020Updated 5 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- A forensic system baselining, searching, and evidence collection tool☆19Sep 4, 2019Updated 6 years ago
- A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18☆18Feb 9, 2026Updated 3 months ago
- Default passwords, webinterface ip-addresses and SSID of routers or wireless routers☆14Jan 20, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 9 years ago
- A proof-of-concept for Web authentication via keystroke dynamics (that is, authenticating users based on *how* they type rather than *wha…☆37Nov 30, 2012Updated 13 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Utilities for identifying users subscribed to s subreddit, downloading their comment histories, and analyzing their commenting behavior☆15Oct 21, 2012Updated 13 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 11 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Research at the intersection of natural language processing and social network analysis.☆13Dec 6, 2020Updated 5 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- PAM module and library for auditing/enforcing Password Topology Histogram Wear-Leveling☆23Apr 26, 2017Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A collection of useful scripts to prepare a new windows installation for use☆21Jun 18, 2024Updated last year
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago