IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+332.76%)
Blackeye PythonBlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (+229.31%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+50%)
go-dkimA Go library to create and verify DKIM signatures (migrated)
Stars: ✭ 38 (-34.48%)
SharkFuture Of Phishing With less delay
Stars: ✭ 150 (+158.62%)
Hermes-Secure-Email-GatewayHermes Secure Email Gateway is a Free Open Source Ubuntu 18.04 or 20.04 Server based Email Gateway that provides Spam, Virus and Malware protection, full in-transit and at-rest email encryption as well as email archiving. It features the latest email authentication techniques such as SPF, DKIM and DMARC.
Stars: ✭ 35 (-39.66%)
PotPhishing on Twitter
Stars: ✭ 223 (+284.48%)
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+310.34%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (+205.17%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (+31.03%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+584.48%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (+134.48%)
mailsec-checkAnother utility to analyze state of deployment of security-related email protocols.
Stars: ✭ 37 (-36.21%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (+322.41%)
VisualBasicObfuscatorVisual Basic Code universal Obfuscator intended to be used during penetration testing assignments.
Stars: ✭ 115 (+98.28%)
MacphishOffice for Mac Macro Payload Generator
Stars: ✭ 202 (+248.28%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+4248.28%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1065.52%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+122.41%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+155.17%)
mailserverSimple and full-featured mail server using Docker
Stars: ✭ 88 (+51.72%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (-15.52%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (+129.31%)
toolbox-wikiInternet.nl toolbox - how-to's for modern mail security standards (DMARC, DKIM, SPF and DANE)
Stars: ✭ 96 (+65.52%)
thundersecThunderSec is a security plugin for Mozilla Thunderbird that creates several pieces of additional security functionality, including DNSBL, RBL, SURBL, DKIM and SPF.
Stars: ✭ 42 (-27.59%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+17.24%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+600%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (-24.14%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-18.97%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+86.21%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+324.14%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+36.21%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+291.38%)
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-39.66%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+265.52%)
InfoPhishInfoPath Phishing Repo Resource
Stars: ✭ 68 (+17.24%)
Socialfishmobile📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+244.83%)
GitemA Github organization reconnaissance tool.
Stars: ✭ 190 (+227.59%)
shareA collection of libraries and tools written in Go.
Stars: ✭ 35 (-39.66%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (+210.34%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-1.72%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (+5.17%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+158.62%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: ✭ 44 (-24.14%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+156.9%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-63.79%)
DragnetYour Social Engineering Sidekick
Stars: ✭ 139 (+139.66%)
dkimGolang DKIM Verifier
Stars: ✭ 21 (-63.79%)
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (-20.69%)
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (-15.52%)
TgaHackingSocial Media Hacking & Information Tool
Stars: ✭ 71 (+22.41%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-34.48%)