Phishing Reverse Proxy with MFA bypass
☆17Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for juicyrout
Users that are interested in juicyrout are comparing it to the libraries listed below
Sorting:
- ☆17Sep 10, 2021Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- How to "bypass" annoying Duo 2FA☆10Feb 9, 2020Updated 6 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- This repository is for public files shared by the Microsoft Information Protection Team☆25Jan 6, 2021Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Mar 2, 2024Updated 2 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- Direct simulation Monte Carlo ThunderBoltz C++ and Python API codes.☆15Aug 28, 2025Updated 6 months ago
- real time face swap and one-click video deepfake with only a single image☆14Sep 10, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- My Blog - https://0xresetti.github.io☆11Updated this week
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- Simulate a camera by picking an image☆12Nov 30, 2022Updated 3 years ago
- 4G/5G远程视频监控和移动控制☆13Aug 14, 2022Updated 3 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆18Jul 31, 2024Updated last year
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Fresh HQ Combo List For Cracking☆10Sep 13, 2021Updated 4 years ago
- Expanded ComfoAir binding v.1x for openHAB with new 160 read and write commands.☆12Mar 15, 2019Updated 6 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- Configure ArchivesSpace as a service provider for oauth user authentication.☆10Feb 2, 2026Updated last month
- Generate letters (plain text or PDF) from templates.☆14Jan 8, 2023Updated 3 years ago
- Hacker Rank - Bank Accounts☆12Jun 15, 2018Updated 7 years ago
- ©ALL IN ONE EMAIL BOMBER. NO SPAM MAIL, DIRECT INBOX ✌☆41Feb 10, 2021Updated 5 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆87Oct 27, 2022Updated 3 years ago
- Small utility written in c++ to bypass windows UAC prompt☆42Aug 4, 2018Updated 7 years ago
- Adds some useful YAML frontmatter to your Obsidian notes☆11May 3, 2024Updated last year