Abusing trust boundaries to deliver effective phishing payloads
☆35Dec 8, 2015Updated 10 years ago
Alternatives and similar repositories for phishJS
Users that are interested in phishJS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆13May 4, 2014Updated 11 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆226Mar 29, 2022Updated 3 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Mar 24, 2015Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- A simple bash script that uses smbclient to test access to Windows file shares in automated fashion.☆19Jul 9, 2015Updated 10 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Jul 28, 2016Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆24Dec 2, 2022Updated 3 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆135Nov 17, 2016Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- scrapes Linkedin for company employee profiles☆57Mar 8, 2017Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago