⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.
☆11Jan 25, 2026Updated last month
Alternatives and similar repositories for PhishTrap
Users that are interested in PhishTrap are comparing it to the libraries listed below
Sorting:
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Sep 13, 2019Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Credential phishing using Android Hotspot Captive Portals☆28Aug 14, 2024Updated last year
- ☆10Sep 11, 2021Updated 4 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Script that can scrape and add members in your Telegram Group.☆12Nov 4, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- ☆10Aug 9, 2024Updated last year
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Aug 20, 2018Updated 7 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆42Jun 27, 2024Updated last year
- Download and loader .NET payload☆36Oct 8, 2019Updated 6 years ago
- A longitudinal dataset for academic literature, including papers, metadata, and citation graphs, Also available on 🤗 HuggingFace and Kag…☆16Sep 6, 2025Updated 5 months ago
- restart adbd with root privileges☆11Oct 21, 2015Updated 10 years ago
- Library for reading and writing dex files☆25Updated this week
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- اقطع الانترنت على كل المتصلين معك في نفس الشبكة وبدون صلاحية روت ابدا الان☆10Oct 7, 2020Updated 5 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆16Dec 22, 2024Updated last year
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago