GemGeorge / SniperPhishLinks
SniperPhish - The Web-Email Spear Phishing Toolkit
☆591Updated 3 months ago
Alternatives and similar repositories for SniperPhish
Users that are interested in SniperPhish are comparing it to the libraries listed below
Sorting:
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆373Updated 2 years ago
- mip22 is a advanced phishing tool☆631Updated last year
- This is a collection of phishing templates and a landing page to be used with goPhish☆419Updated 3 years ago
- fully automated pentesting tool☆514Updated 2 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆615Updated 2 weeks ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- GoPhish Templates that I have retired and/or templates I've recreated.☆186Updated last year
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆728Updated 6 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆531Updated last year
- Kraken: A multi-platform distributed brute-force password cracking system☆320Updated 2 years ago
- Hide your payload into .jpg file☆396Updated 3 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆525Updated last month
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆263Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆234Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆114Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆501Updated last year
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆283Updated 4 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,256Updated 3 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆482Updated 2 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Collection of GoPhish templates available for legitimate usage.☆156Updated 2 years ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆444Updated 6 months ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆513Updated last year
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆497Updated this week
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆814Updated last year
- Fast Modular Web Interfaces Bruteforcer☆227Updated 3 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆485Updated 7 months ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆860Updated 9 months ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago