Pinned Repositories
403-bypass
AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
blog
CobaltStrike-Malleable-Profile
CobaltStrike Malleable Profile
Evilginx2-Phishlets
Many Evilginx2 Phishlets Uptodate
ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
MalwareDev
newschat
newsgen
OSRipper
AV evading OSX Backdoor and Crypter Framework
c0p0x's Repositories
c0p0x/403-bypass
c0p0x/AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
c0p0x/blog
c0p0x/CobaltStrike-Malleable-Profile
CobaltStrike Malleable Profile
c0p0x/Evilginx2-Phishlets
Many Evilginx2 Phishlets Uptodate
c0p0x/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
c0p0x/MalwareDev
c0p0x/newschat
c0p0x/newsgen
c0p0x/OSRipper
AV evading OSX Backdoor and Crypter Framework
c0p0x/PHISHLET-EVILGINX2-
PHISHLET [EVILGINX2] Settings for phishing sites are written in the yaml language. This is a long development of my collection that I have been working on for the last 3 months due to changes in site security rules in particular scripts for bypassing the CloudFlare security. 🙌 I PRESENT to you my collection from the sites : 1Password / Binance / Bitfinex / Bittrex / Bitwarden / Blockchain / Cex.io / Coinbase / Dashlane / Enpass / Enterprise WebAccountManager / Exmo / FTX Trading / Google / Huobi / Keeper / Korbit / Kraken / LastPass / MultiPassword / O365 / Yahoo Contributing If you are interested in creating an email or phishing website template, contact me at [twitter or tlgrm] DEVELOPER DO NOT SUPPORT ANY OF THE ILLEGAL ACTIVITIES. Contact Me on telegram or twitter: https://twitter.com/TrewisScotch / https://t.me/HiroSCOTCH
c0p0x/RedGuard
RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.
c0p0x/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
c0p0x/Threat_Model_Examples
Collection of Threat Models
c0p0x/vulnerability-Checklist
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
c0p0x/Web-Application-Pentest-Checklist