Payload delivery via URL and some social engineering.
☆17Jul 13, 2024Updated last year
Alternatives and similar repositories for urlsploit
Users that are interested in urlsploit are comparing it to the libraries listed below
Sorting:
- Beacon is a Pretty Basic Program to help you Learn how Remote Access tools work.☆14Nov 10, 2018Updated 7 years ago
- Demonstration of Google Chrome Passwords theft☆10Apr 23, 2018Updated 7 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆16Sep 16, 2019Updated 6 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Mar 11, 2020Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.☆73Feb 5, 2020Updated 6 years ago
- Source code of Claw Key logger previously sold on HackForums☆55Aug 6, 2022Updated 3 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Send fake views with account or proxy socks4/5 , http to your destination posts☆15Oct 14, 2025Updated 5 months ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆16Oct 2, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 6 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Nov 13, 2018Updated 7 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A shell script to build fancy DMGs☆11Sep 10, 2018Updated 7 years ago
- iCloud Apple iD BruteForcer☆12Jan 2, 2015Updated 11 years ago
- XERXES la herramienta Ddos más potente.☆13May 7, 2022Updated 3 years ago
- All-in-one tool for penetration testing☆40Oct 28, 2022Updated 3 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 7 years ago
- The best tool to send bulk message to the members of your target group via User-Id by multiple Telegram accounts V3☆12Oct 14, 2025Updated 5 months ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- Tecnicas de escaneo con Nmap☆15Jul 21, 2023Updated 2 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- A simple script to test your knowledge on well known ports☆10Aug 13, 2017Updated 8 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- Es un framework de código abierto para la auditoria en seguridad informática.☆13Oct 12, 2025Updated 5 months ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Python script to perform l2ping flood attack☆29May 20, 2025Updated 10 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- Simple script for deface☆19Apr 26, 2018Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago