• Stars
    star
    299
  • Rank 138,445 (Top 3 %)
  • Language
    CSS
  • Created almost 7 years ago
  • Updated almost 7 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.

SocialEngineeringPayloads

This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.

NOTE: Most of these payloads are PoC to execute calc.exe

Disclaimer

These details/samples are for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (bhdresh) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these details/samples you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these is not bhdresh's responsibility.

Finally, this is a personal development, please respect its philosophy and don't use it for bad things!

Licence

CC BY 4.0 licence - https://creativecommons.org/licenses/by/4.0/

More Repositories

1

CVE-2017-0199

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
Python
704
star
2

Dejavu

DejaVU - Open Source Deception Framework
PHP
367
star
3

CVE-2017-8759

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
Python
317
star
4

lazykatz

Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software.
C#
197
star
5

Whatsapp-IP-leak

Leak the IP address and Geolocation of target whatsapp user
94
star
6

CVE-2021-33766

ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Shell
43
star
7

SnortRules

This is an open source Snort rules repository
25
star
8

CVE-2018-11776

Vulnerable docker container for CVE-2018-11776
10
star
9

taskhash

This tool is developed to assist forensic investigators and auditors to remotely collect the md5sum of running processes on the target windows machine.
AutoIt
6
star
10

ProbesPlotter

ProbesPlotter is a passive WiFi surveillance tool developed to plot the WiFi probe requests from different devices using directed-graph.
3
star