PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing campaigns to capture credentials and bypass two-factor authentication (2FA).
☆30Apr 22, 2019Updated 7 years ago
Alternatives and similar repositories for Phishing-Keylogger-v2
Users that are interested in Phishing-Keylogger-v2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆90Oct 27, 2022Updated 3 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆44Jul 5, 2019Updated 6 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- ☆12Sep 10, 2025Updated 8 months ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆45Nov 5, 2020Updated 5 years ago
- ☆14Jan 8, 2024Updated 2 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Apr 21, 2021Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Temporary Email Service Within Terminal☆11Aug 4, 2020Updated 5 years ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆16Feb 1, 2022Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Dead simple C# project to take a screenshot.☆20Jan 14, 2019Updated 7 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆19Jan 4, 2021Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A small, unfinished utility to browse and download NirSoft programs.☆18Jun 14, 2020Updated 5 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆25Apr 30, 2012Updated 14 years ago
- A simple KeyLogger written in Plain JavaScript. Send data to PHP server.☆21Aug 25, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago