omergunal / Pot
Licence: mit
Phishing on Twitter
Stars: ✭ 223
Programming Languages
python
139335 projects - #7 most used programming language
Projects that are alternatives of or similar to Pot
Maskphish
Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+65.92%)
Mutual labels: phishing, social-engineering
Phishmailer
Generate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+1.79%)
Mutual labels: phishing, social-engineering
Dragnet
Your Social Engineering Sidekick
Stars: ✭ 139 (-37.67%)
Mutual labels: phishing, social-engineering
Dark-Phish
Dark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-74.44%)
Mutual labels: phishing, social-engineering
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-93.27%)
Mutual labels: phishing, social-engineering
Skeleton
Skeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-80.27%)
Mutual labels: phishing, social-engineering
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-60.99%)
Mutual labels: phishing, social-engineering
Spectre
A simple phishing tool that can phish almost any website
Stars: ✭ 57 (-74.44%)
Mutual labels: phishing, social-engineering
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+407.62%)
Mutual labels: phishing, social-engineering
Phishingkithunter
Find phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-20.63%)
Mutual labels: phishing
Recreator Phishing
PROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (-39.01%)
Mutual labels: phishing
Opensquat
Detection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-33.18%)
Mutual labels: phishing
Socialfishmobile
📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (-10.31%)
Mutual labels: phishing
Tigershark
Bilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (-4.93%)
Mutual labels: phishing
Blackeye Python
BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (-14.35%)
Mutual labels: phishing
Esp8266 wifi captive portal
🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords
Stars: ✭ 165 (-26.01%)
Mutual labels: phishing
Phishing on Twitter
Generate tweet automatically like him/her
How it works?
- 1- Collect data from target's twitter account
- 2- Find target's friend and copy her/him account
- 3- Generate tweet automatically with markov chain algorithm and send it
Installation
git clone https://github.com/omergunal/PoT
cd PoT
pip3 install -r requirements.txt
Update your api keys in "PoT.cfg". Go to https://apps.twitter.com/ and get API keys
Usage
python3 PoT.py -u username
ScreenShots
!
Don't use for illegal activity
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].