Bitwise-01 / AnyPhishLinks
A simple site cloner
☆26Updated 7 years ago
Alternatives and similar repositories for AnyPhish
Users that are interested in AnyPhish are comparing it to the libraries listed below
Sorting:
- A Simple Keylogger☆18Updated 6 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago
- A URL shortener☆18Updated 6 years ago
- Discord Scripts☆12Updated 5 years ago
- A simple phishing tool that can phish almost any website☆76Updated 6 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 3 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- A Simple Ransomware☆52Updated last year
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆23Updated 4 years ago
- Secure FTP☆11Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- ☆15Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- a phishing page☆14Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆26Updated 6 years ago
- An encrypted notebook☆33Updated 2 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆33Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- A simple Golang program to collect proxies☆12Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- Basic python script for detect airdroid users in lan☆49Updated 4 years ago
- Python Remote Access Tool☆24Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Updated 2 years ago