Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆122Jan 17, 2021Updated 5 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆216Jun 10, 2021Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers It Will Save Your Valuable Time Scr…☆15Jun 25, 2022Updated 3 years ago
- Use Python to manipulate Charles session files and send HTTP requests.☆13Dec 8, 2022Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Hugo theme that powers awsomsauce!☆10Dec 6, 2022Updated 3 years ago
- A collection of lists that contain random stuff☆17Dec 17, 2016Updated 9 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Aug 19, 2023Updated 2 years ago
- A lot of accounts can be hacked with bruteforce method this is a simple app which demonstrates it on instagram.☆28Nov 4, 2020Updated 5 years ago
- Find data about you or an individual from various online public records☆30May 26, 2017Updated 8 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,667Oct 6, 2025Updated 5 months ago
- Better Google Dorking with Dorker.☆32Aug 28, 2022Updated 3 years ago
- iScanner , Professional security scanner☆18Apr 4, 2014Updated 11 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Jun 12, 2021Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆912Dec 9, 2023Updated 2 years ago
- Black Webbrowser v2.0☆17Sep 22, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- FBBrute FBBrute is a Facebook brute force tool, launches an attack by guessing the target password with a set of wordlist provided. so th…☆17Jul 22, 2023Updated 2 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆75Jan 31, 2026Updated last month
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Cross-platform MSR605 / MSR605X GUI and library☆17May 13, 2023Updated 2 years ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆17Apr 28, 2018Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year