makdosx / mip22Links
mip22 is a advanced phishing tool
☆631Updated last year
Alternatives and similar repositories for mip22
Users that are interested in mip22 are comparing it to the libraries listed below
Sorting:
- SniperPhish - The Web-Email Spear Phishing Toolkit☆605Updated 4 months ago
- CamOver is a camera exploitation tool that allows to disclosure network camera admin password.☆559Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆479Updated last week
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆236Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Updated last year
- Automated brute-forcing attack tool.☆412Updated 4 years ago
- Android remote administration tool☆625Updated 7 months ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆499Updated 9 months ago
- The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using s…☆425Updated 7 months ago
- An XSS Exploitation Tool☆317Updated 3 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆395Updated last week
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆823Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆354Updated last week
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆230Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆430Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated last year
- Automated exploit scanner for cameras on the internet☆202Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆410Updated 3 years ago
- Hide your payload into .jpg file☆395Updated 3 years ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆249Updated 10 months ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆366Updated 4 years ago
- A OSINT tool which helps you to quickly find information effectively. All you need is to input and it will take take care of rest.☆912Updated last year
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆282Updated 4 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆523Updated last year
- Automating Host Exploitation with AI☆543Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆375Updated 2 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆264Updated 4 years ago