SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+568.97%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (-76.92%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-53.05%)
BamfA tool which utilizes Shodan to detect vulnerable IoT devices.
Stars: ✭ 269 (-28.65%)
SharkFuture Of Phishing With less delay
Stars: ✭ 150 (-60.21%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (-60.74%)
learn-ngrok☁️ Learn how to use ngrok to share access to a Web App/Site running on your "localhost" with the world!
Stars: ✭ 50 (-86.74%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (-63.93%)
Docker NgrokAn Ngrok v2 container based on wizardapps/ngrok and fnichol/ngrok
Stars: ✭ 368 (-2.39%)
MiteruAn experimental phishing kit detection tool
Stars: ✭ 125 (-66.84%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+79.31%)
EtherscamdbKeep track of all current ethereum scams in a large database
Stars: ✭ 121 (-67.9%)
kumasia./kumasia php simple backdoor
Stars: ✭ 13 (-96.55%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (-70.03%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (-83.82%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+2640.85%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-30.24%)
King PhisherPhishing Campaign Toolkit
Stars: ✭ 1,352 (+258.62%)
Url ClassificationMachine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (-74.8%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (-46.95%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+88.06%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-17.24%)
Pythempentest framework
Stars: ✭ 1,060 (+181.17%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (-48.28%)
DnstwisterDomain name permutation as a service
Stars: ✭ 36 (-90.45%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+54.64%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+129.97%)
AdvphishingThis is Advance Phishing Tool ! OTP PHISHING
Stars: ✭ 734 (+94.69%)
MercureMercure is a tool for security managers who want to train their colleague to phishing.
Stars: ✭ 262 (-30.5%)
GophishOpen-Source Phishing Toolkit
Stars: ✭ 6,435 (+1606.9%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-89.92%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+62.07%)
GitmailsAn information gathering tool to collect git commit emails in version control host services
Stars: ✭ 142 (-62.33%)
Socialphish The most complete Phishing Tool, with 32 templates +1 customizable
Stars: ✭ 378 (+0.27%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+5.31%)
Virtual RealityStealthy backdoor for Windows operating systems
Stars: ✭ 235 (-37.67%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-88.86%)
StrikerStriker is an offensive information and vulnerability scanner.
Stars: ✭ 1,851 (+390.98%)
CanisrufusA stealthy Python based Windows backdoor that uses Github as a command and control server
Stars: ✭ 207 (-45.09%)
OpenDKIMNo description or website provided.
Stars: ✭ 58 (-84.62%)
BetterbackdoorA backdoor with a multitude of features.
Stars: ✭ 195 (-48.28%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-62.33%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-50.66%)
FatratFatrat -A cloud based Remote Android Managment Suite, Powered by NodeJS
Stars: ✭ 31 (-91.78%)
ZKShSSearch shodan without any knowledge about its queries
Stars: ✭ 37 (-90.19%)
Osi.igInformation Gathering Instagram.
Stars: ✭ 377 (+0%)
Vaultswiss army knife for hackers
Stars: ✭ 346 (-8.22%)
HamburglarHamburglar -- collect useful information from urls, directories, and files
Stars: ✭ 321 (-14.85%)
SitebrokerA cross-platform python based utility for information gathering and penetration testing automation!
Stars: ✭ 281 (-25.46%)
007-TheBondThis Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (-1.59%)
OnionsearchOnionSearch is a script that scrapes urls on different .onion search engines.
Stars: ✭ 135 (-64.19%)