moh85 / qrphisherLinks
Browser-based QRLJacking tool written in pure JavaScript. For educational use only.
☆18Updated 9 months ago
Alternatives and similar repositories for qrphisher
Users that are interested in qrphisher are comparing it to the libraries listed below
Sorting:
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 🔑☆9Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Updated 5 years ago
- WebHook for Red Team☆26Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆9Updated 4 years ago