moh85 / qrphisherLinks
Browser-based QRLJacking tool written in pure JavaScript. For educational use only.
☆17Updated last year
Alternatives and similar repositories for qrphisher
Users that are interested in qrphisher are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆53Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- A wacky exploitation framework written in pure python3.☆24Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- VLAN attacks toolkit☆14Updated 3 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- A tool designed to analyse email headers☆37Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago