debasishm89 / mitm-phishing-poc
An MITM based Social Engineering (Phishing)attack POC!
☆10Updated 10 years ago
Alternatives and similar repositories for mitm-phishing-poc:
Users that are interested in mitm-phishing-poc are comparing it to the libraries listed below
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆1Updated 3 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- Phoenix based exploit kit for educational purpose.☆16Updated 6 years ago
- Random stuff☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)☆8Updated last year
- My public exploit collection.☆32Updated 6 years ago
- HTTP BOTNET☆7Updated last year
- ☆23Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago