Adrilaw / MedusaPhisherView external linksLinks
Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medusa Phisher helps pentesters to evaluate how well employees recognize and respond to phishing attempts, highlighting weaknesses in awareness and training.
☆129Updated this week
Alternatives and similar repositories for MedusaPhisher
Users that are interested in MedusaPhisher are comparing it to the libraries listed below
Sorting:
- ☆12Jan 17, 2026Updated last month
- Creador de un link iplogger☆13Sep 29, 2023Updated 2 years ago
- Garena Free Fire And Garena Free Fire Max☆14Feb 16, 2023Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- ☆11Dec 18, 2023Updated 2 years ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- Network scan tool for host and service discovery. Written in Rust.☆20Oct 12, 2025Updated 4 months ago
- URLHider, a powerful tool designed to make URL masking a breeze.☆31Feb 10, 2025Updated last year
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆21Aug 2, 2025Updated 6 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- dibuat oleh garena free fire☆13Aug 26, 2019Updated 6 years ago
- Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation…☆96Oct 14, 2025Updated 4 months ago
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆14May 20, 2024Updated last year
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- ☆10Dec 3, 2021Updated 4 years ago
- ☆29May 29, 2025Updated 8 months ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- An organized collection of default passwords for various devices and services.☆42Dec 7, 2022Updated 3 years ago
- This script in python allows to send messages anonymously☆176Jun 22, 2025Updated 7 months ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated 11 months ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- USB rubber ducky reverse shell with disabling windows defender☆11Apr 17, 2021Updated 4 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- Source code of 4chan.org☆14Apr 16, 2025Updated 10 months ago
- install the latest version of the DrakFly-Tool V.3.0, 378 Tool for Hacking☆14Jan 19, 2023Updated 3 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- ☆34Jun 13, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 4 months ago
- ☆12Feb 1, 2026Updated 2 weeks ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- ☆47Mar 7, 2025Updated 11 months ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 8 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago