threatland / TL-FRAUD
A collection of fraud related tools for research.
☆148Updated 5 years ago
Alternatives and similar repositories for TL-FRAUD:
Users that are interested in TL-FRAUD are comparing it to the libraries listed below
- This repo contains scripts, frameworks, and other tools related to DDoS.☆35Updated 5 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆145Updated 6 years ago
- A list of private and public (more or less) blackhat boards☆266Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆65Updated 4 years ago
- Darknet OSINT Transform☆120Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 5 years ago
- An Open Source Multi Site Automated Social Media Phishing Framework☆150Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.☆183Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Exposing phishing kits, creators and malicious actors.☆50Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆91Updated 2 years ago
- A toolkit for Security Researchers☆126Updated 5 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆213Updated 6 years ago
- A collection of source code for various RATs, Stealers, and other Trojans.☆427Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- Simple Karma Attack☆67Updated 4 years ago
- ☆104Updated 3 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆92Updated 6 years ago