Adrilaw / MedusaPhisherLinks
Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees recognize and respond to phishing attempts, highlighting weaknesses in awareness and training.
☆81Updated 2 weeks ago
Alternatives and similar repositories for MedusaPhisher
Users that are interested in MedusaPhisher are comparing it to the libraries listed below
Sorting:
- A social engineering toolkit for performing smishing, and other sms attacks☆103Updated last year
- Advance OTP Bypass Tool. Termux Supported.☆100Updated 9 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆96Updated last year
- fsociety is a penetration toolkit inspired from MR. ROBOT☆101Updated 11 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆163Updated last year
- Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will f…☆112Updated 3 months ago
- Bluetooth DOS Attack Script for Educational Purposes. Used in School Project☆163Updated 3 years ago
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆287Updated 9 months ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆129Updated 7 months ago
- An Excellent OSINT tool to get information of any ip address. All details are explained in below screenshot☆268Updated last year
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆64Updated 2 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆190Updated 6 months ago
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆228Updated 6 years ago
- WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from …☆178Updated 2 weeks ago
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆107Updated 3 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆73Updated 7 months ago
- View data of a WhatsApp number, including its status, photo, etc. 🕵🏽♂️☆137Updated 3 months ago
- A bluetooth control script for all your Bluetooth devices DoS needs.☆98Updated last year
- ☆205Updated last month
- Automated Wireless Attack Framework☆77Updated 6 years ago
- GRIM IS A INFORMATION GATHERER AND VULNERABILITY TESTER TOOL, YOU CAN USE IT ON ANY WEBSITE FOR GETTING ITS INFORMATION☆113Updated 4 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆40Updated 9 months ago
- ANDRO Unleash Mobile Security with our Android Exploitation and Analysis Tool. Identify vulnerabilities, reverse engineer apps, and forti…☆85Updated 4 months ago
- Pentesting Suite☆49Updated 5 months ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆268Updated 2 years ago
- A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functiona…☆125Updated last year
- Get information of any phone number. A simple color full tool in python3 for extracting information.☆62Updated last year
- SilverInstaEye is a comprehensive OSINT tool for Instagram. It gathers extensive information about the target user.☆231Updated 7 months ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆32Updated 11 months ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆104Updated 2 years ago