samdenty / injectify
Perform advanced MiTM attacks on websites with ease π
β674Updated last year
Alternatives and similar repositories for injectify:
Users that are interested in injectify are comparing it to the libraries listed below
- Script to steal passwords from ssh.β479Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)β465Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- powerful auto-backdooring utilityβ746Updated 7 years ago
- intercepting kali routerβ439Updated 7 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicβ¦β509Updated 8 years ago
- A web front-end for password cracking and analyticsβ625Updated 3 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β603Updated 3 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ357Updated 6 months ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β233Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.β612Updated 6 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β332Updated 8 months ago
- IP obfuscator made to make a malicious ip a bit cuterβ545Updated 6 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,409Updated 6 years ago
- network reconnaissance toolkitβ423Updated 6 years ago
- SSLStrip version to defeat HSTSβ317Updated 7 years ago
- GTRS - Google Translator Reverse Shellβ615Updated 6 months ago
- Cloak can backdoor any python script with some tricks.β493Updated 5 years ago
- Empire client applicationβ496Updated 3 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)β862Updated 6 years ago
- for mass exploitingβ602Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ372Updated last year
- Phishing on Twitterβ253Updated 6 years ago
- β514Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.β950Updated 5 years ago
- My collection of metasploit auxiliary post-modulesβ191Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automaticallyβ493Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environmentsβ1,213Updated 4 years ago
- A framework for wireless pentesting.β1,205Updated 4 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.β356Updated 2 years ago