All Projects → Lockphish → Similar Projects or Alternatives

912 Open source projects that are alternatives of or similar to Lockphish

Awesome Cybersecurity Blueteam
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Stars: ✭ 2,091 (+1024.19%)
Mutual labels:  cybersecurity
Threadboat
Program Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-29.03%)
Mutual labels:  hacking
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-53.23%)
Mutual labels:  hacking
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-8.06%)
Mutual labels:  hacking
Best Hacking Tools
BEST HACKING TOOLS..For more tools visit our blog for Hackers
Stars: ✭ 46 (-75.27%)
Mutual labels:  hacking
Tweak Series
Repo for YouTube series
Stars: ✭ 44 (-76.34%)
Mutual labels:  hacking
Shark
Future Of Phishing With less delay
Stars: ✭ 150 (-19.35%)
Mutual labels:  kali-linux
Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-76.88%)
Mutual labels:  cybersecurity
Gitmonitor
One way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (-38.17%)
Mutual labels:  cybersecurity
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+2.69%)
Mutual labels:  cybersecurity
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+581.72%)
Mutual labels:  hacking
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+441.4%)
Mutual labels:  hacking
Burp Send To
Adds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-38.71%)
Mutual labels:  hacking
Recommendations for engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-79.03%)
Mutual labels:  cybersecurity
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-19.35%)
Mutual labels:  hacking
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-78.49%)
Mutual labels:  hacking
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+951.61%)
Mutual labels:  hacking
Hacking Tool
Social media & camera hacking & whatsapp virus & SMS bombing
Stars: ✭ 157 (-15.59%)
Mutual labels:  hacking
Jiff
JavaScript library for building web-based applications that employ secure multi-party computation (MPC).
Stars: ✭ 131 (-29.57%)
Mutual labels:  cybersecurity
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-53.76%)
Mutual labels:  hacking
Mobilehackersweapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-8.6%)
Mutual labels:  hacking
Swift Keylogger
Keylogger for mac written in Swift using HID
Stars: ✭ 995 (+434.95%)
Mutual labels:  hacking
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-80.11%)
Mutual labels:  hacking
Adbsploit
A python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-20.97%)
Mutual labels:  hacking
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-81.18%)
Mutual labels:  cybersecurity
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-39.78%)
Mutual labels:  cybersecurity
Jwtcat
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (-2.69%)
Mutual labels:  cybersecurity
Grab.js
fast TCP banner grabbing with node.js
Stars: ✭ 33 (-82.26%)
Mutual labels:  cybersecurity
Black Hat Python
black hat python
Stars: ✭ 109 (-41.4%)
Mutual labels:  cybersecurity
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-82.8%)
Mutual labels:  hacking
Dontclickshit
Як не стати кібер-жертвою
Stars: ✭ 149 (-19.89%)
Mutual labels:  cybersecurity
Fiercephish
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+416.13%)
Mutual labels:  hacking
Fawkes
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-41.94%)
Mutual labels:  hacking
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-83.87%)
Mutual labels:  hacking
Cehv10 Notes
📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-8.6%)
Mutual labels:  hacking
Speedhack
Speedhack coded in C++, inspired by Cheat Engine's own speedhack.
Stars: ✭ 29 (-84.41%)
Mutual labels:  hacking
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-41.94%)
Mutual labels:  cybersecurity
Intranet penetration cheetsheets
做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
Stars: ✭ 29 (-84.41%)
Mutual labels:  hacking
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-21.51%)
Mutual labels:  hacking
Netscan2
active / passive network scanner
Stars: ✭ 27 (-85.48%)
Mutual labels:  cybersecurity
Catnip
Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-41.94%)
Mutual labels:  kali-linux
Taik
Tool hack Dark FB tanpa lisensi
Stars: ✭ 21 (-88.71%)
Mutual labels:  hacking
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-29.57%)
Mutual labels:  hacking
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-54.3%)
Mutual labels:  cybersecurity
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+390.32%)
Mutual labels:  hacking
Socialpwned
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-44.09%)
Mutual labels:  hacking
Awesome Hacking
A curated list of awesome Hacking tutorials, tools and resources
Stars: ✭ 7,756 (+4069.89%)
Mutual labels:  hacking
Instagramcracker
Full Speed Instagram Cracker
Stars: ✭ 147 (-20.97%)
Mutual labels:  hacking
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+367.74%)
Mutual labels:  hacking
The Book Of Secret Knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+29782.8%)
Mutual labels:  hacking
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+366.13%)
Mutual labels:  cybersecurity
Bunkerized Nginx
🛡️ Make your web services secure by default !
Stars: ✭ 2,361 (+1169.35%)
Mutual labels:  cybersecurity
Jenkins Shell
Automating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-54.84%)
Mutual labels:  hacking
Apicheck
The DevSecOps toolset for REST APIs
Stars: ✭ 184 (-1.08%)
Mutual labels:  hacking
Advancedmemorychallenges
Advanced buffer overflow and memory corruption security challenges
Stars: ✭ 174 (-6.45%)
Mutual labels:  cybersecurity
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-13.98%)
Mutual labels:  cybersecurity
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (-29.57%)
Mutual labels:  cybersecurity
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-54.84%)
Mutual labels:  hacking
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+573.66%)
Mutual labels:  cybersecurity
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1062.9%)
Mutual labels:  hacking
301-360 of 912 similar projects