JavaRockstar / Collection-of-Extra-Phishing-Scenarios-WifiphisherView external linksLinks
Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not be legal in your country to use these scripts please read disclaimer before attempting to download any content from this page. Be responsible with these scenarios !. They are intended to be tested on your own n…
☆14Jul 3, 2017Updated 8 years ago
Alternatives and similar repositories for Collection-of-Extra-Phishing-Scenarios-Wifiphisher
Users that are interested in Collection-of-Extra-Phishing-Scenarios-Wifiphisher are comparing it to the libraries listed below
Sorting:
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Aug 7, 2016Updated 9 years ago
- Community-built scenarios for Wifiphisher☆379Apr 27, 2021Updated 4 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆20Mar 26, 2017Updated 8 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- How to install Firecrack in termux☆11Aug 13, 2019Updated 6 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- A tiny, lightweight, easy to use and customize IFTTT (if this, then that) server and (Android) client. The ideal thing for hackers and ho…☆32Sep 11, 2020Updated 5 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- This is the app is made to hack ATM card trust wallet address withdraw and online assess☆14Oct 27, 2022Updated 3 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- A curated list of awesome 🏧 hacking resources.☆14Dec 4, 2025Updated 2 months ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Useful scripts that I create in my free time to benefit the open source community.☆12Dec 14, 2019Updated 6 years ago
- CLI to control Pioneer CDJ devices☆11Mar 22, 2025Updated 10 months ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ATM (Automatic teller machine) with GUI interface.☆11Dec 4, 2019Updated 6 years ago
- Simple Auto WPS Pixie Dust Attack script for walking (using Wifite2)☆12Dec 22, 2019Updated 6 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- TradeGPT is a full-stack cryptocurrency trading application that combines a modern Fresh (Deno) frontend with a Python (FastAPI) backend …☆15Mar 1, 2025Updated 11 months ago
- Magnetometer, Accelerometer and Gyroscope UDOO Management (FXAS21002C, FXOS8700CQ)☆11Nov 7, 2017Updated 8 years ago
- ☆11Jul 10, 2019Updated 6 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 8 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Dec 3, 2019Updated 6 years ago
- sms-hacker using metasploit☆41Feb 17, 2017Updated 9 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Bash script that deploys virtual proxies which route traffic through OpenVPN and Tor tunnels.☆10Jul 29, 2019Updated 6 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- A Stress Testing Tool for Darknet Sites: Opens up Infinite Tabs with the URL that you pass in the UI, an HTTP/HTTPS GET attack.☆11Oct 14, 2021Updated 4 years ago
- Yahoo! Finance next gen python 3 / pandas market data downloader☆10Jul 23, 2021Updated 4 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- Splunk Light with Docker Dashboards☆11Oct 12, 2017Updated 8 years ago
- A mathematical model for Fibonacci Retracement and location entry and exit formulation using ML☆10Aug 2, 2022Updated 3 years ago
- Hack for start other istance of wpa_supplicant daemon☆13Nov 16, 2017Updated 8 years ago
- https://github.com/Ranginang67/Firecrack.git☆17Nov 17, 2019Updated 6 years ago
- A collection of prompts, templates and slash commands for supercharging Claude Code.☆22Jul 29, 2025Updated 6 months ago