#
victim
Here are 19 public repositories matching this topic...
Next Generation Remote Administration Tool (RAT)
windows
administration
networking
csharp
reverse-shell
pipe
malware
beta
netcat
rat
attacker
target-machine
victim
port-listener
-
Updated
Sep 13, 2019 - C#
Gray Fish provides fully undetectable phishing pages means link will not get blocked and hosting provider will not suspend your account.All Templates are under 20KBs.Login form can't be bypass until both inputs filled by a victim.
fish
facebook
knowledge
phishing
programmers
victim
undetectable
fake-login-pages
facebook-fake-security
facebook-desktop-phishing
facebook-mobile-phishing
facebook-messenger-phishing
github-phishing
instagram-phishing
linkedin-phishing
netflix-phishing
protonmail-phishing
snapchat-phishing
tumblr-phishing
twitter-phishing
wordpress-phishing
yahoo-phishing
-
Updated
Jun 10, 2020 - PHP
Windows/Linux - ReverseShellBackdoor Framework
linux
backdoor
trojan
rat
backdoorpython
backdoors
victim-machine
victim
backdooring
trojans
trojan-horse-attack
trojan-rat
-
Updated
Jun 8, 2019 - Python
Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.
encryption
tcp
communication
cipher
packets
protocol
remote
mitm
force
execution
payload
windows-registry
remote-machine
middle
downgrade
winreg
decipher
victim
-
Updated
Sep 10, 2017 - Python
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
attack
virtualbox
cybersecurity
wireshark
kali-linux
beef
bettercap
cyber-security
hacking-tool
ethical-hacking
metasploit
victim
man-in-the-middle-attack
zenmap
-
Updated
Dec 29, 2019 - JavaScript
Attacker can use the scripts to gain reverse shell of a target's machine.
listen
penetration-testing
attacker
client-server
shell-prompt
reverseshell
command-line-interface
victim
-
Updated
Mar 16, 2019 - C
Identifying potential red flags using Watson NLU
python
bootstrap
natural-language
emotion
entities
speech-recognition
speech-to-text
watson-speech
analytical
natural-language-understanding
victim
toneanalyser
tone-analyzer
-
Updated
Jun 21, 2017 - Python
wGen is an simple wordlist generator made in php. It ask you to give information about your victim and when filled, It has intelligent algorithim that simply reads data and make wordlist according to information that you provided.
php
knowledge
password
wordlist
password-strength
weak-passwords
dictionary-attack
wordlist-generator
victim
wgen
-
Updated
Oct 8, 2019 - PHP
An Open Source Project designed to help Social Workers help victims of Domestic Violence and spread awareness of the issue
-
Updated
Oct 16, 2017 - TypeScript
Auto Ambulance System is made to provide Quick and one Tap service to Road Accident Victims - NEC Laboratories India Pvt. Ltd.
product
ux
final-year-project
victim
nec
android-project
website-project
new-project
ui-project
hospital-project
road-accident-project
nec-project
meverick-project
nec-hackathon
auto-rickshaw
wev-app
final-year-project-idea
hackathon-idea
akash-goyal-gothub
akash-goyal
-
Updated
Apr 12, 2020
Spyware for Educational purpose only
-
Updated
Jul 27, 2020 - C#
This is a complete illustrative project on NavMesh in Unity. In this Game the Zombies finds their target(Victim) with the help of the Nav Mesh Technology in Unity and moves towards them until they touch them.
-
Updated
Jan 6, 2018 - C#
-
Updated
Apr 5, 2017 - HTML
Improve this page
Add a description, image, and links to the victim topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the victim topic, visit your repo's landing page and select "manage topics."


This is the List of Broken Phishing Pages.
If Possible , Help Us to Fix them And Maintain Them.