Phishing Reverse Proxy with MFA bypass
☆17Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for juicyrout
Users that are interested in juicyrout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Apr 10, 2025Updated last year
- ☆17Sep 10, 2021Updated 4 years ago
- How to "bypass" annoying Duo 2FA☆10Feb 9, 2020Updated 6 years ago
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 6 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆190May 5, 2025Updated 11 months ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- Azure AD Incident Response☆28Oct 8, 2021Updated 4 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- G-Surge☆10Feb 7, 2018Updated 8 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository is for public files shared by the Microsoft Information Protection Team☆25Jan 6, 2021Updated 5 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- Phone Number Tracker is a tool that allows users to track their own live locations on GPS MAP and in text format. There are several tools…☆41Jul 12, 2023Updated 2 years ago
- A Rust port of BuntDB☆14Aug 5, 2021Updated 4 years ago
- Source Code from my YouTube Tutorials☆10Aug 23, 2025Updated 7 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- real time face swap and one-click video deepfake with only a single image☆13Sep 10, 2024Updated last year
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆86Mar 6, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fresh HQ Combo List For Cracking☆10Sep 13, 2021Updated 4 years ago
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆20Jul 31, 2024Updated last year
- My Blog - https://0xresetti.github.io☆14Mar 19, 2026Updated 3 weeks ago
- XSS (Cross Site Scripting) attack is performed on a website of Bank Management System using Kali Linux and Burp Suite☆10Aug 25, 2021Updated 4 years ago
- Find credit card info using BIN/IIN☆12Dec 29, 2025Updated 3 months ago
- cryptocrack 是一个用Python编写的密码自动破解框架,在basecrack的基础上进行功能完善,期望解决CTF中Crypto部分题型☆14Jan 6, 2023Updated 3 years ago
- Human Oversight for Autonomous AI Agents using Azure Logic Apps + Python☆21Mar 26, 2026Updated 2 weeks ago
- ☆11Jan 28, 2025Updated last year
- This Python script takes a hexadecimal string of digital binary data (from the two tracks of a debit card barcode) and obtains serial, ac…☆12Aug 4, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- A Rust tool to recover .zip files passwords using bruteforce☆12Feb 9, 2026Updated 2 months ago
- Fetch Tiktok account information - including their Username, Nickname, Bio, Region, User ID, Creation Date, Followers, Following, Likes a…☆11Sep 10, 2024Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- ☆17Aug 27, 2022Updated 3 years ago