A Simple RedLineStealer
☆13Aug 30, 2023Updated 2 years ago
Alternatives and similar repositories for Merlot
Users that are interested in Merlot are comparing it to the libraries listed below
Sorting:
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- ☆12Nov 26, 2021Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 9 months ago
- ☆12Mar 8, 2025Updated last year
- custom evilginx2☆10Mar 10, 2024Updated 2 years ago
- RedLine stealer Source Code (Decompiled)☆72Mar 3, 2020Updated 6 years ago
- ☆12Jun 11, 2023Updated 2 years ago
- ☆12Jan 23, 2020Updated 6 years ago
- A simple chess made specially for termux☆12Dec 15, 2020Updated 5 years ago
- Online Banking Project Prototype☆15Nov 20, 2018Updated 7 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Realtek 802.11ac (rtl8812au) Linux Driver Ver.4.3.8☆23Sep 10, 2017Updated 8 years ago
- Consulta jurisprudencial do STF☆15Oct 21, 2025Updated 5 months ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- New Redline Leak☆135Jan 7, 2021Updated 5 years ago
- Bases de dados úteis para a ABJ☆20Apr 25, 2023Updated 2 years ago
- ☆12Jun 4, 2025Updated 9 months ago
- General Purpose Tools for Jurimetrics.☆17Aug 23, 2024Updated last year
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆14Jan 5, 2022Updated 4 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- A scraper that downloads DJEs☆20Feb 19, 2019Updated 7 years ago
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 10 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated 11 months ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago