CAM-DUMPERKALI LINUX / TERMUX tool for hacking victim android front camera.
Stars: ✭ 512 (+82.86%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (-75.71%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-92.5%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (-10.36%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-68.93%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+41.79%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-94.64%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-79.64%)
PotPhishing on Twitter
Stars: ✭ 223 (-20.36%)
Blackeye PythonBlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (-31.79%)
seeuSeeU is a camera hacking tool which is used to hack selfie camera of devices....
Stars: ✭ 313 (+11.79%)
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (-82.5%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (-78.21%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (-28.57%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-86.43%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-84.29%)
grabcamA tool to hack camera from termux for video tutorial visit hackers-hub.com
Stars: ✭ 215 (-23.21%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (-12.5%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-87.5%)
MacphishOffice for Mac Macro Payload Generator
Stars: ✭ 202 (-27.86%)
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (-83.57%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (-74.64%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+800.71%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-36.79%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (-58.93%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (-75.71%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+141.43%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (-61.43%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-72.86%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+201.43%)
CamOverCamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Stars: ✭ 217 (-22.5%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (-82.5%)
gophish-cliGophish Python cli to perform huge phishing campaigns
Stars: ✭ 38 (-86.43%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+45%)
trailofphishPhishing e-mail repository
Stars: ✭ 33 (-88.21%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-83.21%)
SpectreA simple phishing tool that can phish almost any website
Stars: ✭ 57 (-79.64%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (-12.14%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (-18.93%)
OpenDKIMNo description or website provided.
Stars: ✭ 58 (-79.29%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (-24.29%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (-15%)
GitemA Github organization reconnaissance tool.
Stars: ✭ 190 (-32.14%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (-53.93%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (-35.71%)
CamRaptorCamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Stars: ✭ 106 (-62.14%)
ResourcesNo description or website provided.
Stars: ✭ 38 (-86.43%)
blacklistA dataset of various malicious cryptocurrency-related URLs and Twitter profiles
Stars: ✭ 34 (-87.86%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (-35.36%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (-84.29%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-71.79%)