infosec-au / phishJSLinks
Abusing trust boundaries to deliver effective phishing payloads
☆35Updated 10 years ago
Alternatives and similar repositories for phishJS
Users that are interested in phishJS are comparing it to the libraries listed below
Sorting:
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Updated 3 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 9 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago
- ☆13Updated 9 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Updated 12 years ago
- Collection of tools for privesc on Linux☆34Updated 12 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 8 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Updated 9 years ago
- unix wildcard attacks☆137Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- AV Bypass☆29Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- Generates several metasploit payloads☆15Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 9 years ago
- ☆32Updated 10 years ago