JohnTroony / T0rnView external linksLinks
Social Engineering template for credential harvesting. (Facebook as an example).
☆45Apr 3, 2018Updated 7 years ago
Alternatives and similar repositories for T0rn
Users that are interested in T0rn are comparing it to the libraries listed below
Sorting:
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- AUR Driver with monitor mode and frame injection for the trl8814au wifi chip☆10Nov 21, 2019Updated 6 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- RTL8814AU drivers with monitor mode, frame injection and AP+Jammer☆14Apr 10, 2020Updated 5 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆47Jul 17, 2017Updated 8 years ago
- a phishing page☆14Aug 7, 2017Updated 8 years ago
- Cyber stalker is a web application based tool to catch fake account users online☆18May 6, 2023Updated 2 years ago
- In a simple word, it is an "Automatic WP Exploiter".☆17Dec 26, 2016Updated 9 years ago
- Generator for fake ID barcodes. (Currently SC only, looking to expand).☆31Jan 5, 2015Updated 11 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- aircrack-ng gui 2019☆20Oct 30, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- Extract useful information from a Twitter account.☆35Jan 1, 2014Updated 12 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- The Social-Engineer Toolkit (SET) Copyright 2015 The Social-Engineer Toolkit (SET) Written by: David Kennedy (ReL1K) Company: TrustedS…☆21Jan 1, 2016Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- A simple site cloner☆27Aug 20, 2017Updated 8 years ago
- Override the IP address returned for one or more domains.☆25May 13, 2024Updated last year
- Social Engineering Tool Oriented to facebook☆58Apr 7, 2017Updated 8 years ago
- Automated victim-customized phishing attacks against Wi-Fi clients☆74Jan 15, 2017Updated 9 years ago
- MATA-SERVER is the web server version of the MATA visitor bot, designed for simulating website traffic. This complements the terminal-bas…☆14Jan 2, 2025Updated last year
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- open-source intelligence gathering for SIEMs <3☆37Feb 16, 2017Updated 8 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- ultrafast single TCP packet audio/visual experience☆27Jul 16, 2017Updated 8 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Development repository for the firewall cookbook☆101Feb 2, 2026Updated last week
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Automatically gambles using accounts created with free balance from promo codes☆10Apr 11, 2023Updated 2 years ago
- Google Script for creating a simple help desk / ticket system using Google Sheets with a linked Google Form☆13Jul 6, 2021Updated 4 years ago
- Docker repository for OWTF (64-bit Kali)☆34Oct 31, 2025Updated 3 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago
- NIST transition-edge sensor (TES) data acquisition framework☆14Feb 2, 2026Updated last week
- ☆13Aug 28, 2025Updated 5 months ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- Here is some iOS code snippets that I wrote or I collected from the internet.☆10Apr 9, 2022Updated 3 years ago