jamesm0rr1s / Phishing-Keylogger-v2
PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing campaigns to capture credentials and bypass two-factor authentication (2FA).
☆30Updated 6 years ago
Alternatives and similar repositories for Phishing-Keylogger-v2:
Users that are interested in Phishing-Keylogger-v2 are comparing it to the libraries listed below
- Anubis 7.0☆25Updated 6 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Stealph-botnet its a simpel botnet i code this for fun☆26Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- remote administrator framework☆21Updated 8 months ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆16Updated 6 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- chrome keylogger extension !!!☆18Updated 5 years ago
- Lulzwiper Ransomware 2.0☆17Updated 4 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆31Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆32Updated 3 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- Fully Undetectable telegram Rat dropper☆35Updated 4 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆18Updated 2 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- ☆9Updated 2 years ago