Analyzerπ Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: β 108 (+145.45%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: β 149 (+238.64%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: β 3,485 (+7820.45%)
DnsmorphDomain name permutation engine written in Go
Stars: β 148 (+236.36%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: β 256 (+481.82%)
SkeletonSkeleton is a Social Engineering tool attack switcher
Stars: β 44 (+0%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: β 177 (+302.27%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: β 79 (+79.55%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: β 3,124 (+7000%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: β 676 (+1436.36%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: β 76 (+72.73%)
ThechoiceThe linux choice collection tools
Stars: β 245 (+456.82%)
PotPhishing on Twitter
Stars: β 223 (+406.82%)
MacphishOffice for Mac Macro Payload Generator
Stars: β 202 (+359.09%)
Blackeye PythonBlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: β 191 (+334.09%)
SocialfishPhishing Tool & Information Collector
Stars: β 2,522 (+5631.82%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: β 49 (+11.36%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: β 180 (+309.09%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: β 31 (-29.55%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: β 406 (+822.73%)
SharkFuture Of Phishing With less delay
Stars: β 150 (+240.91%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: β 246 (+459.09%)
HadesThe best way to hack into VMware accounts.
Stars: β 61 (+38.64%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: β 227 (+415.91%)
docker-mispA (nearly) production ready Dockered MISP
Stars: β 184 (+318.18%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: β 212 (+381.82%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: β 21 (-52.27%)
Socialfishmobileπ± π An app to remote control SocialFish.
Stars: β 200 (+354.55%)
d4-coreD4 core software (server and sample sensor client)
Stars: β 40 (-9.09%)
GitemA Github organization reconnaissance tool.
Stars: β 190 (+331.82%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Winβ¦
Stars: β 38 (-13.64%)
intelligence-iconsintelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: β 32 (-27.27%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: β 136 (+209.09%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: β 397 (+802.27%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: β 150 (+240.91%)
MiteruAn experimental phishing kit detection tool
Stars: β 125 (+184.09%)
DragnetYour Social Engineering Sidekick
Stars: β 139 (+215.91%)
InfoPhishInfoPath Phishing Repo Resource
Stars: β 68 (+54.55%)
Blackphishπ± [ Phishing Made Easy ] π± (In Beta)
Stars: β 133 (+202.27%)
utilitiesThis repository contains tools used by 401trg.
Stars: β 19 (-56.82%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: β 109 (+147.73%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: β 126 (+186.36%)
ApeXUsing Social Engineering To Obtain WiFi Passwords
Stars: β 87 (+97.73%)
EtherscamdbKeep track of all current ethereum scams in a large database
Stars: β 121 (+175%)
King Phisher TemplatesTemplates for the King Phisher open source phishing campaign toolkit.
Stars: β 119 (+170.45%)
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: β 61 (+38.64%)
Phish CollectPython script to hunt phishing kits
Stars: β 113 (+156.82%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: β 130 (+195.45%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: β 47 (+6.82%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: β 10,333 (+23384.09%)