11 Components & Libraries
Sortby
Well, Spoofy is different and here is why: After the initial testing using Microsoft 365, some combinations were retested using Protonmail and Gmail due to the differences in their handling of banner…
If you think a project should be included here I really want to know, but keep in mind that this isn't supposed to be a dictionary. I want to keep the best, covering as many bases as possible while m…
Reverse shells can be established through HTTP or HTTPS. The certificates used for HTTPS can be auto-generated by Phantom or supplied by the user. Phantom includes a helper shell script that enables …
• This tool is for educational purposes only. • We are not responsible for any illegal usage of this tool. LFITester is a Python3 tool which tests if a server is vulnerable to Local File Inclusion (L…
Also, it gives you a baseline structure for your further injections of new security attacks or new IoT protocols. One of the most important features of PENIOT is being extensible. By default, it has …
The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual stage VBS infection vector, and a dual stage HTA infection vector. The variables take into account C2 add…
INTRO: Miner in the Middle is a script that allows you to inject javascript miners into targets on your local network. It does this using python, scapy and netfilterqueue. When you run the applicatio…
Subscribe to our newsletter