D4RKH0R1Z0N / gphishLinks
Most updated UI for google phishing by D4RKH0R1Z0N
☆25Updated last year
Alternatives and similar repositories for gphish
Users that are interested in gphish are comparing it to the libraries listed below
Sorting:
- Full Valid Fake Data Generator☆102Updated last year
- ☆72Updated 2 years ago
- Evildork targeting your fiancee👁️☆88Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆107Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Embedding executable files in PDF Documents☆45Updated 6 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆50Updated 3 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Updated 2 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Updated 6 years ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 8 months ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated last year
- Sifter - All purpose penetration testing op-center☆81Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆191Updated 6 months ago
- Automatically clone websites and patch them with PHP to create phishing pages☆61Updated 5 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year
- Simple program to steal private files from removable storages☆87Updated 3 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34Updated 5 months ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Updated 6 years ago
- Simple script to bulk check if IPs match networks☆11Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆44Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Information Gathering Simplified.☆73Updated 2 years ago
- PrivacyNet: Privacy Network☆51Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago