debasishm89 / mitm-phishing-pocView external linksLinks
An MITM based Social Engineering (Phishing)attack POC!
☆10Mar 25, 2014Updated 11 years ago
Alternatives and similar repositories for mitm-phishing-poc
Users that are interested in mitm-phishing-poc are comparing it to the libraries listed below
Sorting:
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 3 months ago
- 'mispitools' is an open-source package written in the R statistical language. It consists of a collection of decision-making tools design…☆38Jan 28, 2026Updated 2 weeks ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- Simple MapReduce implementation in Python, for text file parallel processing☆20Mar 3, 2012Updated 13 years ago
- ☆13Sep 13, 2015Updated 10 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- Start a conversation with an RNN-based Ronald Reagan!☆10Jun 18, 2017Updated 8 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- This tool is design for FTP brute force☆13Jan 23, 2024Updated 2 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Research at the intersection of natural language processing and social network analysis.☆13Dec 6, 2020Updated 5 years ago
- 3D printed mini circular table saw.☆11Jul 19, 2014Updated 11 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- 利用nginx+flask搭建自有微博平台,并展示平台中消息扩散过程及演化过程☆10Jul 28, 2015Updated 10 years ago
- ☆10Aug 13, 2012Updated 13 years ago
- Dependency Syntactic Parsing for Portuguese, Spanish, English, and Galician, including MetaRomance parser☆10Jun 7, 2018Updated 7 years ago
- Phone number tracer in bash, enjoy!☆10Dec 2, 2021Updated 4 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- R scripts and executable binder for blog post about using Purrr for mapping over ML hyperparameters☆11May 15, 2019Updated 6 years ago
- From country name, Network /Service and location☆11Jul 17, 2024Updated last year
- ☆12Feb 22, 2024Updated last year
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Real valued neural networks (RVNN) and complex valued neural networks (CVNN) (Akira Hirose, 2012).☆11Jul 17, 2017Updated 8 years ago
- Fast discrete distributions clustering using Wasserstein barycenter with sparse support☆12Nov 20, 2018Updated 7 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- ☆17May 30, 2018Updated 7 years ago
- DiDi-Udacity Self-Driving Car Challenge 2017 Raw Data Reader☆11Apr 17, 2017Updated 8 years ago
- Projects from the Elektron Analog Rytm Mk2☆11Jan 11, 2026Updated last month
- js_rpc通杀版本☆14Oct 9, 2021Updated 4 years ago
- wechat android sdk☆11Jul 16, 2015Updated 10 years ago
- Crawler that collects and extracts content of daily published news articles☆12Feb 18, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 16, 2020Updated 5 years ago