debasishm89 / mitm-phishing-poc
An MITM based Social Engineering (Phishing)attack POC!
☆10Updated 10 years ago
Alternatives and similar repositories for mitm-phishing-poc:
Users that are interested in mitm-phishing-poc are comparing it to the libraries listed below
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 6 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Updated 11 months ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆23Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.Updated 3 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- ☆13Updated 7 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago