Lists (1)
Sort Name ascending (A-Z)
Stars
7
stars
written in Go
Clear filter
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.
A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB
framework to rapidly implement custom droppers for all three major operating systems