19 Social Media Phishing Pages #phishing #shellphish #phish
☆16Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for shellphish
Users that are interested in shellphish are comparing it to the libraries listed below
Sorting:
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 5 years ago
- Facebook Access Token Generator☆18Sep 30, 2020Updated 5 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- ☆20Feb 5, 2021Updated 5 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- Hide any file in a PNG Image☆19Feb 21, 2017Updated 9 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,373May 1, 2025Updated 10 months ago
- A tool to generate fake profile for filling of form☆11Apr 30, 2023Updated 2 years ago
- A better DNS Cache Snooping tool☆19Mar 8, 2025Updated last year
- A way to track and visualize current and past locations of multiple cell phones on Google Maps. Includes geofencing, prevents texting wit…☆13Dec 9, 2012Updated 13 years ago
- A good tool to hide phishing traps or cut links.☆41Nov 29, 2023Updated 2 years ago
- ☆14Jul 3, 2021Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Payload Maker ( Only For lazy people like me..!!! )☆11Jan 18, 2018Updated 8 years ago
- Create your own desktop applications using web technologies you're familiar with, such as PHP, HTML JavaScript, CSS and SQLite☆10Nov 19, 2023Updated 2 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- FUD Android Payload and Listener☆20Jul 3, 2018Updated 7 years ago
- This is a python implementation of cell phone tracking using based on the assigned phone number from the service provider and geo-locatio…☆13May 31, 2022Updated 3 years ago
- Python Virus!☆10Mar 16, 2023Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- The RedVox Software Development Kit☆10Jul 10, 2024Updated last year
- A thin wrapper to post HTML emails through mailgun.com☆12Mar 23, 2024Updated last year
- Packages using the X Window System.☆12Feb 9, 2019Updated 7 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- recursos en español para profes con conciencia digital☆11Oct 14, 2018Updated 7 years ago
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- 😈✨ URLSp00f is an URL Spoofing/Shortening T00L (Helpful in Social-3ngineering Att4cks)☆15Mar 23, 2022Updated 3 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆14Mar 14, 2021Updated 5 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Web To App - Examples of how to port a Web or HTML5 game to a native Android, iOS and Mac OS X App☆15Oct 30, 2022Updated 3 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆44Nov 24, 2024Updated last year
- Fake WiFi Access Point with captive portal☆11May 18, 2025Updated 10 months ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- GeoIP Target Redirection and Target Filter Redirector using GeoIP API (JS)☆22Oct 14, 2020Updated 5 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆46May 5, 2019Updated 6 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago