11 Components & Libraries
Sortby
Well, Spoofy is different and here is why: After the initial testing using Microsoft 365, some combinations were retested using Protonmail and Gmail due to the differences in their handling of banner…
Also, it gives you a baseline structure for your further injections of new security attacks or new IoT protocols. One of the most important features of PENIOT is being extensible. By default, it has …
• This tool is for educational purposes only. • We are not responsible for any illegal usage of this tool. LFITester is a Python3 tool which tests if a server is vulnerable to Local File Inclusion (L…
Reverse shells can be established through HTTP or HTTPS. The certificates used for HTTPS can be auto-generated by Phantom or supplied by the user. Phantom includes a helper shell script that enables …
The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual stage VBS infection vector, and a dual stage HTA infection vector. The variables take into account C2 add…
INTRO: Miner in the Middle is a script that allows you to inject javascript miners into targets on your local network. It does this using python, scapy and netfilterqueue. When you run the applicatio…
If you think a project should be included here I really want to know, but keep in mind that this isn't supposed to be a dictionary. I want to keep the best, covering as many bases as possible while m…
Subscribe to our newsletter