WPA2-FritzBox-Pswd-Wordlist-GeneratorThis Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-55.1%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-48.98%)
GitemA Github organization reconnaissance tool.
Stars: ✭ 190 (+287.76%)
King Phisher TemplatesTemplates for the King Phisher open source phishing campaign toolkit.
Stars: ✭ 119 (+142.86%)
Grayfishlight weight phishing framework with 18+ pages.
Stars: ✭ 101 (+106.12%)
ZphisherAn automated phishing tool with 30+ templates.
Stars: ✭ 1,321 (+2595.92%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+402.04%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+2210.2%)
PhishingkittrackerLet's track phishing kits to give to research community raw material to study !
Stars: ✭ 126 (+157.14%)
Socialfishmobile📱 🐟 An app to remote control SocialFish.
Stars: ✭ 200 (+308.16%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (+120.41%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (+95.92%)
UmbrellaA Phishing Dropper designed to Pentest.
Stars: ✭ 180 (+267.35%)
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (+51.02%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+206.12%)
ShellphishPhishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest
Stars: ✭ 1,037 (+2016.33%)
FiercephishFiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more.
Stars: ✭ 960 (+1859.18%)
StinkyphishMonitor Certificate Transparency Logs For Phishing Domains
Stars: ✭ 25 (-48.98%)
PhishmailerGenerate Professional Phishing Emails Fast And Easy
Stars: ✭ 227 (+363.27%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+204.08%)
AdvphishingThis is Advance Phishing Tool ! OTP PHISHING
Stars: ✭ 734 (+1397.96%)
MiteruAn experimental phishing kit detection tool
Stars: ✭ 125 (+155.1%)
MacphishOffice for Mac Macro Payload Generator
Stars: ✭ 202 (+312.24%)
EtherscamdbKeep track of all current ethereum scams in a large database
Stars: ✭ 121 (+146.94%)
Auto-Besside-CapturerCapture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.
Stars: ✭ 28 (-42.86%)
Phish CollectPython script to hunt phishing kits
Stars: ✭ 113 (+130.61%)
Blackeye PythonBlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only
Stars: ✭ 191 (+289.8%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+20987.76%)
GophishOpen-Source Phishing Toolkit
Stars: ✭ 6,435 (+13032.65%)
King PhisherPhishing Campaign Toolkit
Stars: ✭ 1,352 (+2659.18%)
SocialfishPhishing Tool & Information Collector
Stars: ✭ 2,522 (+5046.94%)
Url ClassificationMachine learning to classify Malicious (Spam)/Benign URL's
Stars: ✭ 95 (+93.88%)
IsthislegitDashboard to collect, analyze, and respond to reported phishing emails.
Stars: ✭ 251 (+412.24%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (+261.22%)
PhisherTool designed for performing various social engineering attacks, for phishing.
Stars: ✭ 66 (+34.69%)
qd-realizationA quasi-deterministic (Q-D) channel implementation in MATLAB software
Stars: ✭ 29 (-40.82%)
Pythempentest framework
Stars: ✭ 1,060 (+2063.27%)
DnstwisterDomain name permutation as a service
Stars: ✭ 36 (-26.53%)
ThechoiceThe linux choice collection tools
Stars: ✭ 245 (+400%)
SootyThe SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (+1669.39%)
SharkFuture Of Phishing With less delay
Stars: ✭ 150 (+206.12%)
NexphisherAdvanced Phishing tool for Linux & Termux
Stars: ✭ 822 (+1577.55%)
windfall-eliminationWindfall Elimination Provision Awareness Project: improving the experience of retirees around an obscure Social Security rule affecting 8+ states (previously https://ssacalculator.org)
Stars: ✭ 23 (-53.06%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+1234.69%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+202.04%)
PotPhishing on Twitter
Stars: ✭ 223 (+355.1%)
DragnetYour Social Engineering Sidekick
Stars: ✭ 139 (+183.67%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+1146.94%)
SpoofcheckSimple script that checks a domain for email protections
Stars: ✭ 437 (+791.84%)
Recreator PhishingPROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS
Stars: ✭ 136 (+177.55%)
PhishiousAn open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
Stars: ✭ 397 (+710.2%)
termux-wifiBash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+728.57%)