PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter
☆61Oct 24, 2021Updated 4 years ago
Alternatives and similar repositories for PhishingPost
Users that are interested in PhishingPost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆33Aug 16, 2023Updated 2 years ago
- New Version Hack script For mining ESCOIN free☆10Apr 25, 2022Updated 4 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆146Oct 24, 2021Updated 4 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆148Sep 2, 2022Updated 3 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆67Oct 24, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆150Dec 13, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆20Apr 19, 2023Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Apr 12, 2020Updated 6 years ago
- Bitcoin Generator Balance Check | Crack BTC | Earn And Donate ~BTC Address: ~☆11Dec 13, 2024Updated last year
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Windows Remote Administration Tool (RAT)☆33Feb 11, 2019Updated 7 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- hack a wifi client using this tool☆13Dec 14, 2023Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Dec 14, 2021Updated 4 years ago
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- Javascript Bot Detector☆13Jan 7, 2022Updated 4 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ☆25Jul 7, 2022Updated 3 years ago