redteamsecurity2023 / EvilnoVNC
This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC connection. In addition, this tool allows us to see in real time all the victim's activities, access to downloaded files and the entire browser profile, including cookies, saved passwords, browsing history, etc.
☆11Updated 2 years ago
Alternatives and similar repositories for EvilnoVNC:
Users that are interested in EvilnoVNC are comparing it to the libraries listed below
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆10Updated 2 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- An automated e-mail OSINT tool☆20Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆31Updated 4 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 2 years ago
- Who We Are☆19Updated 7 months ago
- Hacking with PasteJacking technique☆22Updated 9 months ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- VLAN attacks toolkit☆14Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Cracking protocols FTP and SSH.☆11Updated 8 months ago