seanthegeek / phishforallView external linksLinks
A USB phishing evaluation platform
☆46Oct 15, 2015Updated 10 years ago
Alternatives and similar repositories for phishforall
Users that are interested in phishforall are comparing it to the libraries listed below
Sorting:
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Apr 25, 2017Updated 8 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆246Mar 11, 2019Updated 6 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 9 months ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Aug 18, 2018Updated 7 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Penetration testing automation toolkit☆22Jul 4, 2015Updated 10 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Jul 28, 2018Updated 7 years ago
- Tool For Frontal Camera Hack.☆61Nov 16, 2025Updated 3 months ago
- Collection of reverse shells☆56Oct 31, 2020Updated 5 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Knowledge Manager Agent for Claude Code - Extract and organize content from web, PDF, social media to Obsidian/Notion☆26Jan 19, 2026Updated 3 weeks ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Hacking every email by use script Mr.Robot☆57Sep 1, 2018Updated 7 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆120May 29, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- This is the latest KLCiS Voucher System embedded portal for Omada cloud/hardware controller. With this, the client can now check their pu…☆17Mar 6, 2025Updated 11 months ago
- Whole house water leak detection and water shutoff system. Requires a supervisory computer for full functionality. Communications is via…☆10Mar 16, 2025Updated 11 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆88Feb 3, 2025Updated last year
- Python script wrote to automate the process of generating various reverse shells.☆200Jan 3, 2026Updated last month
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- open ports to the Internet easily and for free through special hostings☆29Nov 23, 2024Updated last year
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year