[Tools][SE & OSINT] leapsecurity/InSpy

This commit is contained in:
pe3zx 2019-01-31 02:54:17 +07:00
parent f1e471962b
commit 1be4ec4cce

View File

@ -2508,6 +2508,10 @@ _return-to-libc techniques_
<td><a href="https://github.com/kgretzky/evilginx2">kgretzky/evilginx2</a></td> <td><a href="https://github.com/kgretzky/evilginx2">kgretzky/evilginx2</a></td>
<td>Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</td> <td>Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</td>
</tr> </tr>
<tr>
<td><a href="https://github.com/leapsecurity/InSpy">leapsecurity/InSpy</a></td>
<td>A python based LinkedIn enumeration tool</td>
</tr>
<tr> <tr>
<td><a href="https://www.mailsploit.com/index">Mailsploit</a></td> <td><a href="https://www.mailsploit.com/index">Mailsploit</a></td>
<td>TL;DR: Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.</td> <td>TL;DR: Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.</td>