ustayready / CredSniper
CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.
☆1,345Updated 4 years ago
Alternatives and similar repositories for CredSniper:
Users that are interested in CredSniper are comparing it to the libraries listed below
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,127Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,699Updated 2 months ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,334Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,298Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,248Updated 2 years ago
- Find exploits in local and online databases instantly☆1,683Updated 3 years ago
- Undetectable Windows Payload Generation☆1,568Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,206Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- AntiVirus Evasion Tool☆1,671Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,055Updated this week
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,687Updated 3 months ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆949Updated 2 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,104Updated 7 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,086Updated 4 years ago
- ☆509Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,414Updated last year
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Phishing Campaign Toolkit☆2,321Updated 6 months ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆607Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆985Updated 7 years ago
- Python antivirus evasion tool☆1,401Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,239Updated 3 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,083Updated 2 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆616Updated this week
- Reconnaissance Swiss Army Knife☆1,846Updated 4 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,160Updated 2 years ago
- HTA encryption tool for RedTeams☆1,375Updated 2 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,598Updated last year