v-byte-cpu / juicyroutLinks
Phishing Reverse Proxy with MFA bypass
☆17Updated 2 years ago
Alternatives and similar repositories for juicyrout
Users that are interested in juicyrout are comparing it to the libraries listed below
Sorting:
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- HTTP based framework for building command and control components for remote access trojans☆15Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- UAdmin Phishlets for common sites☆14Updated 2 months ago
- Repository of tools used in my blog☆51Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆17Updated 4 years ago
- Method to bypass Google's JS security when using MITM phishing tools☆61Updated last year
- ☆17Updated 3 years ago
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆13Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆45Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆78Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year