v-byte-cpu / juicyrout
Phishing Reverse Proxy with MFA bypass
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for juicyrout
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated 11 months ago
- HTTP based framework for building command and control components for remote access trojans☆12Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆27Updated 4 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Lateralus is terminal based phishing campaign tool☆25Updated last year
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆11Updated 2 years ago
- Method to bypass Google's JS security when using MITM phishing tools☆58Updated last year
- A Hacking and Pentesting Tool for Windows☆18Updated 7 months ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆14Updated last week
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆17Updated 3 years ago
- Helps To Bypass Av Sometimes☆17Updated 3 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- Proof of concept denial of service over TOR stress test tool☆35Updated 6 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14Updated last year
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 3 weeks ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- A simple script to obfuscate batch(bat) code easily☆23Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆11Updated 9 months ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆18Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year