MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+464.29%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (+157.14%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+73707.14%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+150%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+4728.57%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+142.86%)
CatharsisRaw syscall implementations with Powershell
Stars: ✭ 18 (+28.57%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+521.43%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+385.71%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+442.86%)
red-tldr-dbRed TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Stars: ✭ 33 (+135.71%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+250%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+1600%)
InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+1014.29%)
gophish-cliGophish Python cli to perform huge phishing campaigns
Stars: ✭ 38 (+171.43%)
window-ratThe purpose of this tool is to test the window10 defender protection and also other antivirus protection.
Stars: ✭ 59 (+321.43%)
crimson-sprayA lockout aware password sprayer
Stars: ✭ 11 (-21.43%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+1692.86%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+671.43%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (+214.29%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (+1650%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+385.71%)
trailofphishPhishing e-mail repository
Stars: ✭ 33 (+135.71%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (+0%)
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (+228.57%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (+335.71%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (+50%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+1328.57%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (+171.43%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+500%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+2735.71%)
red-tldrred-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to execute, so it is more suitable for use by red team personnel with certain experience.
Stars: ✭ 159 (+1035.71%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+2800%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (+307.14%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (+28.57%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+821.43%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+235.71%)
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (+250%)
NativePayload CBTNativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Stars: ✭ 109 (+678.57%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (+407.14%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+1657.14%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (+7.14%)
pitchThe initial conversation slides and menu of scenarios
Stars: ✭ 37 (+164.29%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+1521.43%)
PotPhishing on Twitter
Stars: ✭ 223 (+1492.86%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+1414.29%)
MacphishOffice for Mac Macro Payload Generator
Stars: ✭ 202 (+1342.86%)
Socialfishmobile📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+1328.57%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (+721.43%)