Perform advanced MiTM attacks on websites with ease π
β682Mar 25, 2024Updated last year
Alternatives and similar repositories for injectify
Users that are interested in injectify are comparing it to the libraries listed below
Sorting:
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.β948May 8, 2019Updated 6 years ago
- Script to steal passwords from ssh.β489Dec 19, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connectionsβ1,449Nov 20, 2025Updated 3 months ago
- π‘ A python program to create a fake AP and sniff data.β1,691Nov 3, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ1,385Jun 17, 2022Updated 3 years ago
- β524Aug 11, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,437Nov 3, 2018Updated 7 years ago
- AntiVirus Evasion Toolβ1,741Apr 23, 2025Updated 10 months ago
- JShell - Get a JavaScript shell with XSS.β532May 5, 2019Updated 6 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendorsβ¦β1,296Dec 23, 2018Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environmentsβ1,213Sep 14, 2020Updated 5 years ago
- Remote Recon and Collectionβ459Nov 23, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitationβ602Dec 6, 2024Updated last year
- Steal Net-NTLM Hash using Bad-PDFβ1,142Oct 20, 2025Updated 4 months ago
- A framework for wireless pentesting.β1,229Oct 14, 2020Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.β45Jun 19, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed overβ¦β383Aug 17, 2018Updated 7 years ago
- htcap is a web application scanner able to crawl single page application (SPA) recursively by intercepting ajax calls and DOM changes.β626Oct 11, 2021Updated 4 years ago
- Privilege Escalation Project - Windows / Linux / Macβ2,602Oct 4, 2024Updated last year
- A tool to elevate privilege with Windows Tokensβ1,053Oct 6, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)β827Nov 3, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.β1,784Jul 27, 2024Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)β874Dec 28, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β443Jul 11, 2017Updated 8 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)β933May 28, 2025Updated 9 months ago
- My collection of metasploit auxiliary post-modulesβ192May 25, 2019Updated 6 years ago
- UAC bypass, Elevate, Persistence methodsβ2,739Feb 13, 2023Updated 3 years ago
- Undetectable Windows Payload Generationβ1,609Nov 8, 2022Updated 3 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.β2,291Jul 10, 2024Updated last year
- Automated Mass Exploiterβ5,211May 22, 2023Updated 2 years ago
- a CLI for ephemeral penetration testingβ16Dec 10, 2019Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ373Apr 27, 2023Updated 2 years ago
- Payload Generation Frameworkβ1,964Aug 21, 2024Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.β1,307Jan 31, 2022Updated 4 years ago
- DNS Rebinding Exploitation Frameworkβ493Apr 27, 2021Updated 4 years ago
- Sniffs sensitive data from interface or pcapβ1,813Nov 2, 2023Updated 2 years ago
- Rapid Attack Infrastructure (RAI)β310Nov 24, 2024Updated last year
- Official Black Hat Arsenal Security Tools Repositoryβ4,231Aug 26, 2024Updated last year
- Car Backdoor Makerβ220Oct 1, 2018Updated 7 years ago