HsounaZinoubi's repositories

Depix

Recovers passwords from pixelized screenshots

License:NOASSERTIONStargazers:0Issues:0Issues:0

AutoRDPwn

The Shadow Attack Framework

License:GPL-3.0Stargazers:0Issues:0Issues:0

btcpayserver

A cross platform, self-hosted server compatible with Bitpay API

License:MITStargazers:0Issues:0Issues:0

merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

License:GPL-3.0Stargazers:0Issues:0Issues:0

Evilginx2-Phishlets

Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes

Stargazers:0Issues:0Issues:0

ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.

License:GPL-3.0Stargazers:0Issues:0Issues:0

SkCodecFuzzer

Fuzzing harness for testing proprietary image codecs supported by Skia on Android

License:Apache-2.0Stargazers:0Issues:0Issues:0

letsproxy

Quickly fetch Let's Encrypt certs and serve a reverse proxy

License:MITStargazers:0Issues:0Issues:0

mydicebot.github.io

MyDiceBot - Ultimate Bitcoin Dice Bot

License:GPL-3.0Stargazers:0Issues:0Issues:0

fondu

Fondu ICO website

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

phishlets

Phishlets for Evilginx2 (MITM proxy Framework)

License:GPL-3.0Stargazers:0Issues:0Issues:0

CVE-2019-0708

Scanner PoC for CVE-2019-0708 RDP RCE vuln

Language:CLicense:Apache-2.0Stargazers:0Issues:0Issues:0

KMS_VL_ALL

🔑KMS_VL_ALL - Smart Activation Script

Stargazers:0Issues:0Issues:0

muraena

Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.

Language:GoLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0
Language:GoLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

docker-smtp

SMTP docker container

Language:ShellLicense:MITStargazers:0Issues:0Issues:0

evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Language:GoLicense:GPL-3.0Stargazers:0Issues:0Issues:0
Language:GoLicense:MITStargazers:0Issues:0Issues:0

Knock

:key: Scan the entire internet for SSH and Telnet services. Then hack them.

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

Modlishka

Modlishka. Reverse Proxy.

Language:GoLicense:NOASSERTIONStargazers:0Issues:0Issues:0

PhishingPretexts

A library of pretexts to use on offensive phishing engagements.

Language:HTMLLicense:GPL-3.0Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

LeakLooker

Find open databases with Shodan

Language:PythonStargazers:0Issues:0Issues:0

Parad0x

Shodan scanner (Mass Exploiter) # Hacking Exploit Malware API CVE Python

Language:PythonStargazers:1Issues:0Issues:0

lynis

Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

Language:ShellLicense:GPL-3.0Stargazers:0Issues:0Issues:0

xmrig

Monero (XMR) CPU miner

Language:C++License:GPL-3.0Stargazers:0Issues:0Issues:0

UBoat

HTTP Botnet Project

Language:C++License:MITStargazers:0Issues:0Issues:0

Cr3dOv3r

Know the dangers of credential reuse attacks.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

DumpsterDiver

Tool to search secrets in various filetypes.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

SocialFish

Ultimate phishing tool. Socialize with the credentials.

Language:HTMLLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0