PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing campaigns to capture credentials and bypass two-factor authentication (2FA).
☆30Apr 22, 2019Updated 7 years ago
Alternatives and similar repositories for Phishing-Keylogger-v2
Users that are interested in Phishing-Keylogger-v2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Oct 27, 2022Updated 3 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆44Jul 5, 2019Updated 6 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago
- Modern Javascript keylogger with web panel☆22May 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- ☆12Sep 10, 2025Updated 7 months ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆45Nov 5, 2020Updated 5 years ago
- The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element.☆17Sep 18, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- SQLiToolkit is a SQL injection Based Toolkit. There are many features such as Vulnerability Scanner, Url Fuzzer in this tool. This is a U…☆13Feb 8, 2022Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Apr 21, 2021Updated 5 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago
- Dive deep into the world of Remote Desktop Protocol (RDP) with this powerful and efficient brute forcer. Penetration testers and security…☆16Sep 1, 2023Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆25Apr 30, 2012Updated 13 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cookies, passwords, tokens, ip grabber.☆15Aug 17, 2021Updated 4 years ago
- ☆23Mar 28, 2021Updated 5 years ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- ☆15Sep 19, 2019Updated 6 years ago
- ☆15Oct 29, 2024Updated last year