hash3liZer / phishlets
Phishlets for Evilginx2 (MITM proxy Framework)
☆147Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for phishlets
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆107Updated 3 years ago
- Many Evilginx2 Phishlets Uptodate☆48Updated 10 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆117Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆146Updated 3 years ago
- FUD metasploit Persistence RAT☆0Updated last year
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆157Updated 6 months ago
- blackhole is a ransomware coded in c#☆27Updated 4 years ago
- necromantic session control☆153Updated last week
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆57Updated 3 years ago
- Open-Source Collection of Social Engineering Pretexts☆129Updated last year
- mosquito - Automating reconnaissance and brute force attacks☆127Updated 4 years ago
- A powerful PHP email spoofer with a polished UI, rich text editor, and multiple sending options.☆120Updated 8 months ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆56Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆108Updated 3 years ago
- A library of pretexts to use on offensive phishing engagements.☆327Updated 5 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆149Updated 2 years ago
- Automated rogue access point setup tool.☆192Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆309Updated 3 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆103Updated 5 years ago