Most updated UI for google phishing by D4RKH0R1Z0N
☆26Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for gphish
Users that are interested in gphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GPhisher is an advanced Google phishing tool that operates directly from your terminal and includes a login page that instils trust.☆13Jun 20, 2024Updated last year
- Решения различных OSINT-задач / OSINT tasks writeups in Russian☆18Apr 26, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- All Labs of the Security for Developers Training☆10Feb 10, 2023Updated 3 years ago
- Golang best practice snippets☆13Nov 26, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Google account phishing tool written in python using django☆109Apr 8, 2026Updated last week
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆14Feb 24, 2021Updated 5 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- My termux configuration☆11Mar 14, 2023Updated 3 years ago
- custom evilginx2☆10Mar 10, 2024Updated 2 years ago
- CLP Principles by the Liquid Legal Institute☆11Apr 12, 2021Updated 5 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- API for voter registration status and sample ballots in Michigan.☆12Jan 7, 2026Updated 3 months ago
- ☆18Mar 19, 2026Updated last month
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Get instagram story/post updates from some user and send it to telegram☆14Apr 23, 2022Updated 3 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆25Jun 16, 2018Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- API for National Voter File.☆15Jul 29, 2017Updated 8 years ago
- IKnowWhatYouDownload By Cephei - Check Torrent downloads for last 30 days by User IP☆56Jan 4, 2022Updated 4 years ago
- Your multipurpose, open source Discord bot.☆12Apr 11, 2026Updated last week
- Google dork generator with php☆20Nov 18, 2022Updated 3 years ago
- A simple remote scanner for Liferay Portal☆21Apr 6, 2025Updated last year
- A Node.js wrapper for the Google WiFi API☆14Oct 25, 2021Updated 4 years ago
- ☆11Jan 4, 2023Updated 3 years ago
- 🐛 A list of writeups from the Google VRP Bug Bounty program☆12Jun 10, 2025Updated 10 months ago
- Apache 2.4.50 Path traversal vulnerability☆17Aug 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Mar 29, 2022Updated 4 years ago
- Lookup a YouTube channel by the custom url, handle, username, vanity and channel ID☆15Jan 14, 2025Updated last year
- Tutorials for crime mapping in R☆14Jan 8, 2025Updated last year
- PoC Hacking Tool Contains so many stuff like hash cracking, Crypter, Ransomware Builder, etc...☆16Aug 27, 2021Updated 4 years ago
- Little php class for instagram.☆19Aug 7, 2025Updated 8 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago