🧩
Working
Lists (1)
Sort Name ascending (A-Z)
Stars
2
stars
written in JavaScript
Clear filter
A tool to transform Chromium browsers into a C2 Implant
A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solu…