PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter
☆61Oct 24, 2021Updated 4 years ago
Alternatives and similar repositories for PhishingPost
Users that are interested in PhishingPost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24May 19, 2022Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆148Sep 2, 2022Updated 3 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Phishing framework for cloning and capturing data on targeted websites.☆14Feb 20, 2015Updated 11 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆149Dec 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆20Apr 19, 2023Updated 2 years ago
- Facebook phishing page☆10Oct 4, 2020Updated 5 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 6 years ago
- Deduplicate files on your APFS file system (or any file system that supports cloning files via cp -c)☆27Mar 10, 2020Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Windows Remote Administration Tool (RAT)☆33Feb 11, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆27Aug 2, 2019Updated 6 years ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Apr 10, 2026Updated last week