samdenty / injectify
Perform advanced MiTM attacks on websites with ease π
β666Updated 10 months ago
Alternatives and similar repositories for injectify:
Users that are interested in injectify are comparing it to the libraries listed below
- for mass exploitingβ598Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β435Updated 7 years ago
- network reconnaissance toolkitβ420Updated 6 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β233Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)β462Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ542Updated 3 months ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β326Updated 6 months ago
- A framework for wireless pentesting.β1,199Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β598Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerabilityβ465Updated 7 years ago
- A web front-end for password cracking and analyticsβ623Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,399Updated 6 years ago
- wide range mass audit toolkitβ991Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ355Updated 3 months ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)β497Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)β852Updated 6 years ago
- Script to steal passwords from ssh.β478Updated 6 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicβ¦β507Updated 8 years ago
- powerful auto-backdooring utilityβ741Updated 7 years ago
- Phishing on Twitterβ252Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ370Updated last year
- β510Updated last year
- Cloak can backdoor any python script with some tricks.β487Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.β948Updated 5 years ago
- Auto Root Exploit Toolβ531Updated last year
- Empire client applicationβ494Updated 2 years ago
- intercepting kali routerβ438Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.β487Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,298Updated 3 years ago
- SSLStrip version to defeat HSTSβ315Updated 7 years ago