milo2012 / phishing-frenzy-template-clonerView external linksLinks
☆24Jan 31, 2016Updated 10 years ago
Alternatives and similar repositories for phishing-frenzy-template-cloner
Users that are interested in phishing-frenzy-template-cloner are comparing it to the libraries listed below
Sorting:
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆30Feb 21, 2022Updated 3 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- ☆17Apr 8, 2015Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- A simple polymorphic engine☆21Jun 5, 2020Updated 5 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- ☆20Mar 21, 2024Updated last year
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Apr 12, 2015Updated 10 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- A collaborative CTF framework written in Django.☆17Nov 6, 2014Updated 11 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Executes lateral movement through PowerPoint DCOM objects☆20Feb 3, 2018Updated 8 years ago