Evilginx3 Phishlet Templates
☆24Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for evilginx3-phishlet-templates
Users that are interested in evilginx3-phishlet-templates are comparing it to the libraries listed below
Sorting:
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- Flash Bitcoin Sender is a software designed to enable you send fake Bitcoin from any wallet address to another wallet address on the bloc…☆12Sep 13, 2022Updated 3 years ago
- Basic Ethical Hacking - Cheat Sheet☆17Jan 31, 2026Updated last month
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Updated Evilginx3 Phishlet for Microsoft365☆26Aug 16, 2023Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆90Mar 16, 2024Updated last year
- scrap email from instagram user followers☆12Jul 21, 2023Updated 2 years ago
- This is a repository focused on SS7 protocol research focusing on vulnerabilities, security flaws, attack methodologies, techniques, and …☆48Sep 22, 2024Updated last year
- This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifical…☆675May 27, 2025Updated 9 months ago
- Repository for uploading all extra resources for students enrolled in Simpler Hacking's Evilginx3 Pro Course☆31Nov 22, 2023Updated 2 years ago
- Domain Grabber Made With Love :3☆13May 3, 2025Updated 10 months ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 10 months ago
- Go ransomware utilising ChaCha20 and ECIES encryption.☆66Jul 3, 2024Updated last year
- Fresh HQ Combo List For Cracking☆10Sep 13, 2021Updated 4 years ago
- Hacker Rank - Bank Accounts☆12Jun 15, 2018Updated 7 years ago
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆18Jul 31, 2024Updated last year
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- ☆10Jan 18, 2023Updated 3 years ago
- An open source tool designed for spying, information gathering, social engineering and reverse engineering Discord clients/bots☆16Oct 14, 2018Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- script that grabs urls from google dork or search and outputs to TXT file☆11Jul 19, 2023Updated 2 years ago
- Fetch Tiktok account information - including their Username, Nickname, Bio, Region, User ID, Creation Date, Followers, Following, Likes a…☆12Sep 10, 2024Updated last year
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- The goal of this repository is to accelerate Azure OpenAI service adoption and put an enterprise governance structure around it using Azu…☆12Sep 13, 2023Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- Find credit card info using BIN/IIN☆12Dec 29, 2025Updated 2 months ago
- Welcome to the LLM Tutorials and RAG Implementations repository! This repository provides tutorials, guides, and implementations for work…☆12Jul 1, 2025Updated 8 months ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- 《亿级流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago