Update README.md
parent
b9dcd30592
commit
0f9b78cee9
10
README.md
10
README.md
|
@ -85,6 +85,7 @@ hosts, open ports/ banners, and employee names from different public sources. ht
|
|||
* **Meterpreter_Paranoid_Mode.sh** allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to. https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL
|
||||
|
||||
## Delivery
|
||||
### Phishing
|
||||
* **King Phisher** is a tool for testing and promoting user awareness by simulating real world phishing attacks. https://github.com/securestate/king-phisher
|
||||
* **FiercePhish** is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. https://github.com/Raikia/FiercePhish
|
||||
* **ReelPhish** is a Real-Time Two-Factor Phishing Tool. https://github.com/fireeye/ReelPhish/
|
||||
|
@ -93,10 +94,9 @@ https://github.com/chrismaddalena/GoReport
|
|||
* **CredSniper** is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens. https://github.com/ustayready/CredSniper
|
||||
* **PwnAuth** a web application framework for launching and managing OAuth abuse campaigns. https://github.com/fireeye/PwnAuth
|
||||
* **Phishing Frenzy** Ruby on Rails Phishing Framework. https://github.com/pentestgeek/phishing-frenzy
|
||||
* **Phishing Pretexts** a library of pretexts to use on offensive phishing engagements. https://github.com/L4bF0x/PhishingPretexts
|
||||
### Watering Hole Attack
|
||||
* **BeEF** is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. https://github.com/beefproject/beef
|
||||
* **Wifiphisher** is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point. https://github.com/wifiphisher/wifiphisher
|
||||
* **Evilginx** is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. https://github.com/kgretzky/evilginx
|
||||
* **mana** toolkit for wifi rogue AP attacks and MitM. https://github.com/sensepost/mana
|
||||
|
||||
## Command and Control
|
||||
### Remote Access Tools
|
||||
|
@ -196,6 +196,10 @@ data stream as a sequence of HTTPS requests and responses. https://github.com/ar
|
|||
* **Powershell RAT** python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment. https://github.com/Viralmaniar/Powershell-RAT
|
||||
|
||||
## Misc
|
||||
### Wireless Networks
|
||||
* **Wifiphisher** is a security tool that performs Wi-Fi automatic association attacks to force wireless clients to unknowingly connect to an attacker-controlled Access Point. https://github.com/wifiphisher/wifiphisher
|
||||
* **Evilginx** is a man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. https://github.com/kgretzky/evilginx
|
||||
* **mana** toolkit for wifi rogue AP attacks and MitM. https://github.com/sensepost/mana
|
||||
### Embedded & Peripheral Devices Hacking
|
||||
* **magspoof** a portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. https://github.com/samyk/magspoof
|
||||
* **WarBerryPi** was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible in a short period of time with being as stealth as possible. https://github.com/secgroundzero/warberry
|
||||
|
|
Loading…
Reference in New Issue