CybrZone / phishkiller
☆88Updated 7 months ago
Alternatives and similar repositories for phishkiller:
Users that are interested in phishkiller are comparing it to the libraries listed below
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆62Updated 6 months ago
- ☆71Updated 11 months ago
- C# session hijacking gui☆115Updated 5 months ago
- 3 ways of bypassing admin restrictions/uac☆220Updated 8 months ago
- batch multi tool https://www.youtube.com/watch?v=x9aGS-FzONg☆36Updated 6 months ago
- smb bruteforce in batch, video: https://www.youtube.com/watch?v=sFcRukVhgCA☆99Updated 10 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆155Updated 5 months ago
- PsExec batch file but better☆48Updated last year
- reupload of oak grabber☆40Updated 9 months ago
- A complete software for injecting your payload into any Windows executable.☆28Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆28Updated 2 months ago
- Evora is the best AI personal assistant bot in the field of ethical hacking and penetration testing. She has a high level of accuracy and…☆77Updated 5 months ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆87Updated last year
- just sum simple network stuff☆94Updated 2 years ago
- ☆44Updated 2 years ago
- Turning smart lights into Wifi Hacking implants.☆118Updated last month
- https://48hr.email | Dont give shady companies your real email. Use 48hr.email to protect your privacy!☆67Updated 3 months ago
- ☆77Updated 2 years ago
- capNcook - a dark web exploration tool☆64Updated 11 months ago
- ☆54Updated 7 months ago
- This repo contains my writeups and code from YouTube videos☆34Updated last week
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆19Updated 7 months ago
- Autofill Phishing☆63Updated 3 months ago
- An automation script written in Python to convert a Raspberry Pi into a WiFi hacking device☆62Updated 2 years ago
- Tool with a huge database of hacked CTV Cameras, sorted by country.☆29Updated last year
- Multi-Tool Example☆40Updated last year
- windows user phish☆41Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆61Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆51Updated 10 months ago
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆42Updated 9 months ago