Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero
☆49Sep 3, 2017Updated 8 years ago
Alternatives and similar repositories for Cartero
Users that are interested in Cartero are comparing it to the libraries listed below
Sorting:
- Cartero - Social Engineering Framework☆175Jun 23, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- ☆24Feb 1, 2025Updated last year
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- lulz: automated webstalking tool☆54Jun 3, 2016Updated 9 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66May 16, 2024Updated last year
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- ☆10May 8, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago