⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.
☆11Jan 25, 2026Updated last month
Alternatives and similar repositories for PhishTrap
Users that are interested in PhishTrap are comparing it to the libraries listed below
Sorting:
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 8 months ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Notes I made while preparing for the CRTP certification exam☆13Jul 1, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- APK black-box obfuscator for my Master's project☆14May 2, 2021Updated 4 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- ☆10Jan 1, 2023Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- C/C++ Based SDR Library with dsp blocks☆16Aug 15, 2024Updated last year
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- Android trojan streamer client jar☆17Sep 11, 2016Updated 9 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Hidden RDP☆22Sep 20, 2024Updated last year
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Chat GPT Things by Taylor Newsome☆12Mar 19, 2024Updated 2 years ago
- Iranian SMS And CALL Bomber Over 150 Api☆40Sep 5, 2022Updated 3 years ago
- Wireshark Packet Analyzer with MCP Integration This project integrates the MCP (Message Communication Protocol) server with Wireshark to…☆22Mar 31, 2025Updated 11 months ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- Detect and Extract Table On Image (OpenCV)☆18Aug 3, 2020Updated 5 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- Javascript Botnet☆27Aug 14, 2018Updated 7 years ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆14Jan 5, 2022Updated 4 years ago
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Clone an NFC card☆16May 22, 2021Updated 4 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- poc for CVE-2025-14847☆24Dec 26, 2025Updated 2 months ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- اقطع الانترنت على كل المتصلين معك في نفس الشبكة وبدون صلاحية روت ابدا الان☆11Oct 7, 2020Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago