I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+23%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-60.5%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+322%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-52%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-62%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+307.5%)
PSServicePrincipalPowerShell module for creating and deleting enterprise and registered applications as well as SPN object (single and batch) for automation. This can be used as a facilitator for setting up Exchange PowerShell CBA
Stars: ✭ 14 (-93%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (-78%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-81%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-81%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-82.5%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (-65.5%)
nTimetoolsTimestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
Stars: ✭ 25 (-87.5%)
OffensiveCloudDistributionLeverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Stars: ✭ 86 (-57%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-72%)
brutasWordlists and passwords handcrafted with ♥
Stars: ✭ 32 (-84%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-76.5%)
adduser-dllSimple DLL that add a user to the local Administrators group
Stars: ✭ 48 (-76%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (-63.5%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (-66%)
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (-75.5%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-84.5%)
AzureAD Autologon BruteBrute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (-55%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-89%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+19%)
tridentautomated password spraying tool
Stars: ✭ 133 (-33.5%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-63.5%)
fastapi-azure-authEasy and secure implementation of Azure AD for your FastAPI APIs 🔒 B2C, single- and multi-tenant support.
Stars: ✭ 174 (-13%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-71.5%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-74%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (-35.5%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (-46%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (-64.5%)
Linux-Active-Directory-join-scriptActive directory Join script for Ubuntu, Debian, CentOS, Linux Mint, Fedora, Kali, Elementary OS and Raspbian with built in failchcheck and debugmode for Ubuntu. "The most advanced and updated AD join script on GITHUB for Linux"
Stars: ✭ 97 (-51.5%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (-21.5%)
fileless-elf-execExecute ELF files without dropping them on disk
Stars: ✭ 237 (+18.5%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (-42.5%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-78%)
SLibSLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (-75%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-82.5%)
KnockOutlookA little tool to play with Outlook
Stars: ✭ 188 (-6%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-56.5%)
OpenDKIMNo description or website provided.
Stars: ✭ 58 (-71%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-93%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+109%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+238%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-81.5%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (-66%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (-69.5%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+1757.5%)
gophish-cliGophish Python cli to perform huge phishing campaigns
Stars: ✭ 38 (-81%)