An MITM based Social Engineering (Phishing)attack POC!
☆10Mar 25, 2014Updated 12 years ago
Alternatives and similar repositories for mitm-phishing-poc
Users that are interested in mitm-phishing-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Jun 6, 2017Updated 8 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Haxxis Visualization System☆26May 22, 2017Updated 8 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Deploy telegram bot server in github workflows.☆17Jan 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Remote Administration Tool made in golang language.☆11Aug 7, 2023Updated 2 years ago
- Projects from the Elektron Analog Rytm Mk2☆11Jan 11, 2026Updated 2 months ago
- Automated Social Media Phishing Tool. Automated tool that allow us to hack accounts with 2FA Bypass.☆43Mar 10, 2024Updated 2 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- Remote Access Tool written in VBNET☆17Sep 8, 2020Updated 5 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- A forensic system baselining, searching, and evidence collection tool☆19Sep 4, 2019Updated 6 years ago
- A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18☆19Feb 9, 2026Updated last month
- Default passwords, webinterface ip-addresses and SSID of routers or wireless routers☆14Jan 20, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- A proof-of-concept for Web authentication via keystroke dynamics (that is, authenticating users based on *how* they type rather than *wha…☆37Nov 30, 2012Updated 13 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Utilities for identifying users subscribed to s subreddit, downloading their comment histories, and analyzing their commenting behavior☆15Oct 21, 2012Updated 13 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 10 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Research at the intersection of natural language processing and social network analysis.☆13Dec 6, 2020Updated 5 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- PAM module and library for auditing/enforcing Password Topology Histogram Wear-Leveling☆23Apr 26, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Sponsored By Mr ROBOT☆14Nov 15, 2020Updated 5 years ago
- A collection of useful scripts to prepare a new windows installation for use☆20Jun 18, 2024Updated last year
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago