Adrilaw / MedusaPhisherLinks
Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees recognize and respond to phishing attempts, highlighting weaknesses in awareness and training.
☆51Updated last year
Alternatives and similar repositories for MedusaPhisher
Users that are interested in MedusaPhisher are comparing it to the libraries listed below
Sorting:
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆62Updated 2 years ago
- Advance OTP Bypass Tool. Termux Supported.☆96Updated 8 months ago
- A social engineering toolkit for performing smishing, and other sms attacks☆101Updated last year
- It is an automated phishing tool that includes more than 30 phishing templates.☆93Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆161Updated last year
- An Excellent OSINT tool to get information of any ip address. All details are explained in below screenshot☆263Updated 11 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆61Updated 3 months ago
- Herramienta de OSINT profundo para la red social instagram, esta herramienta esta creada con python para sacar la maxima infornacion de u…☆38Updated last year
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆167Updated last month
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆189Updated 5 months ago
- Pentesting Suite☆48Updated 4 months ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆128Updated 6 months ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆98Updated last year
- A tool for WI-FI penetration testing that automates your attacking processes.☆40Updated 8 months ago
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆107Updated 3 years ago
- fsociety is a penetration toolkit inspired from MR. ROBOT☆98Updated 11 months ago
- Get information of any phone number. A simple color full tool in python3 for extracting information.☆62Updated last year
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆226Updated 6 years ago
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆113Updated 4 years ago
- Automated Wireless Attack Framework☆76Updated 6 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆51Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆69Updated 6 months ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆265Updated last year
- Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will f…☆111Updated 2 months ago
- How to set up and install Ss7 and Sigtran Adapt☆28Updated last year
- Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.☆64Updated 2 years ago
- Bluetooth DOS Attack Script for Educational Purposes. Used in School Project☆163Updated 3 years ago
- Useful tool to track location or mobile number.☆57Updated last month
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆31Updated 10 months ago