Phishing Reverse Proxy with MFA bypass
☆17Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for juicyrout
Users that are interested in juicyrout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Sep 10, 2021Updated 4 years ago
- How to "bypass" annoying Duo 2FA☆10Feb 9, 2020Updated 6 years ago
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 6 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188May 5, 2025Updated 10 months ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆88Oct 27, 2022Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- This repository is for public files shared by the Microsoft Information Protection Team☆25Jan 6, 2021Updated 5 years ago
- 《亿级流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆81Mar 6, 2026Updated 2 weeks ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- real time face swap and one-click video deepfake with only a single image☆13Sep 10, 2024Updated last year
- A quiz to analyse how well your friends know about you. Phishing Web Application to steal Instagram Passwords☆15May 15, 2024Updated last year
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆19Jul 31, 2024Updated last year
- My Blog - https://0xresetti.github.io☆14Mar 1, 2026Updated 3 weeks ago
- XSS (Cross Site Scripting) attack is performed on a website of Bank Management System using Kali Linux and Burp Suite☆10Aug 25, 2021Updated 4 years ago
- Human Oversight for Autonomous AI Agents using Azure Logic Apps + Python☆21Feb 20, 2026Updated last month
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- cryptocrack 是一个用Python编写的密码自动破解框架,在basecrack的基础上进行功能完善,期望解决CTF中Crypto部分题型☆14Jan 6, 2023Updated 3 years ago
- Exposing phishing kits seen from phishunt.io☆266Jun 13, 2025Updated 9 months ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- A Rust tool to recover .zip files passwords using bruteforce☆12Feb 9, 2026Updated last month
- Fetch Tiktok account information - including their Username, Nickname, Bio, Region, User ID, Creation Date, Followers, Following, Likes a…☆11Sep 10, 2024Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ©ALL IN ONE EMAIL BOMBER. NO SPAM MAIL, DIRECT INBOX ✌☆41Feb 10, 2021Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- Send spam emails to your target.☆41Oct 11, 2022Updated 3 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- ☆19Aug 11, 2022Updated 3 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago