Exposing phishing kits, creators and malicious actors.
☆52Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for Phishing_Kits
Users that are interested in Phishing_Kits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- A tool designed to hunt for Phishing Kit source code☆231Jan 29, 2026Updated 2 months ago
- User Profile Template☆11Mar 21, 2020Updated 6 years ago
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- FACEBOOK BOT SPAM SHARE The function of this tool is to share spam posts you want using the URL post from Facebook Lite. You need an ext…☆15Jan 11, 2024Updated 2 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 10 months ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆44Jul 5, 2019Updated 6 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- Simple self destructing note site☆13Aug 15, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- Grab passwords from Chrome > v80 using their new AES encryption☆34Aug 17, 2021Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆61Oct 1, 2019Updated 6 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Aug 29, 2020Updated 5 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- Android Single Chat App using Firebase :)☆16Apr 2, 2018Updated 8 years ago
- Version 2.0 of the quick and simple algorithm to search in big files faster than other rivals (Grep-Egrep etc)☆10Aug 15, 2020Updated 5 years ago
- Bypass 2FA Instagram☆51Jan 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago
- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as …☆16Updated this week
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- ☆54Mar 8, 2021Updated 5 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- A set of protocols to screw up the malicious activities of phishers who store the victim's stolen data on Telegram chats/channels☆34Feb 2, 2025Updated last year
- AutoExploiter Wordpress , Joomla , Drupal☆18Mar 27, 2018Updated 8 years ago