Storm-BreakerSocial engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+2512.28%)
docker-symfonyDocker Symfony (PHP-FPM - NGINX - MySQL - MailHog - Redis - RabbitMQ)
Stars: ✭ 32 (-43.86%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-17.54%)
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+19.3%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+331.58%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-56.14%)
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+271.93%)
ssh2actionsConnect to GitHub Actions VM via SSH for interactive debugging
Stars: ✭ 62 (+8.77%)
Socialfishmobile📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+250.88%)
docker-serveohttps://serveo.net is an alternative for ngrok. taichunmin/serveo can let you secure URL to your localhost server through any NAT or firewall in Docker. And taichunmin/serveo-server can let you host your own serveo.
Stars: ✭ 91 (+59.65%)
pgrokFree Introspected tunnels to localhost, like ngrok but free and unlimited
Stars: ✭ 244 (+328.07%)
Phishing-DatasetPhishing dataset with more than 88,000 instances and 111 features. Web application available at. https://gregavrbancic.github.io/Phishing-Dataset/
Stars: ✭ 21 (-63.16%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+1047.37%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (+215.79%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+163.16%)
Facebook-phishingPhishing Facebook Page in Django Code(Python Based)
Stars: ✭ 129 (+126.32%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+161.4%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+250.88%)
PhishruffusIntelligent threat hunter and phishing servers
Stars: ✭ 44 (-22.81%)
Blackphish🔱 [ Phishing Made Easy ] 🔱 (In Beta)
Stars: ✭ 133 (+133.33%)
twitivity🐍 Twitter Accounts Activity API Client Library for Python
Stars: ✭ 49 (-14.04%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (+121.05%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+38.6%)
King Phisher TemplatesTemplates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (+108.77%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+89.47%)
longtongueCustomized Password/Passphrase List inputting Target Info
Stars: ✭ 61 (+7.02%)
Grayfishlight weight phishing framework with 18+ pages.
Stars: ✭ 101 (+77.19%)
DictGenerate使用Go语言编写的社工字典生成器(The social engineering dictionary generator written by Go)
Stars: ✭ 64 (+12.28%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (+68.42%)
SpoofcheckSimple script that checks a domain for email protections
Stars: ✭ 437 (+666.67%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+2217.54%)
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (+29.82%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1085.96%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+2331.58%)
ShellphishPhishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+1719.3%)
HadesThe best way to hack into VMware accounts.
Stars: ✭ 61 (+7.02%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+1584.21%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+217.54%)
Socialphish The most complete Phishing Tool, with 32 templates +1 customizable
Stars: ✭ 378 (+563.16%)
wifimitmWi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (-14.04%)
AdvphishingThis is Advance Phishing Tool ! OTP PHISHING
Stars: ✭ 734 (+1187.72%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+52.63%)
GophishOpen-Source Phishing Toolkit
Stars: ✭ 6,435 (+11189.47%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+971.93%)
portlessEasy local domains with superpowers
Stars: ✭ 106 (+85.96%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+596.49%)
Blackeye-for-WindowsThis is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…
Stars: ✭ 38 (-33.33%)
blacklistA dataset of various malicious cryptocurrency-related URLs and Twitter profiles
Stars: ✭ 34 (-40.35%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+1380.7%)
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (-19.3%)