hash3liZer / phishlets
Phishlets for Evilginx2 (MITM proxy Framework)
☆147Updated 4 years ago
Alternatives and similar repositories for phishlets:
Users that are interested in phishlets are comparing it to the libraries listed below
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆159Updated 8 months ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆90Updated 4 years ago
- Many Evilginx2 Phishlets Uptodate☆48Updated last year
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆289Updated 3 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆105Updated 5 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆372Updated 9 months ago
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆57Updated 6 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆149Updated 2 years ago
- necromantic session control☆157Updated 2 months ago
- FUD metasploit Persistence RAT☆4Updated last year
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆338Updated 3 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆311Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆109Updated 3 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆337Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆129Updated 5 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆224Updated 3 years ago