JoulioK / Phishing_KitsLinks
Exposing phishing kits, creators and malicious actors.
☆52Updated 2 years ago
Alternatives and similar repositories for Phishing_Kits
Users that are interested in Phishing_Kits are comparing it to the libraries listed below
Sorting:
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆105Updated 7 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- A collection of fraud related tools for research.☆150Updated 6 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆147Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- ☆53Updated 4 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆152Updated 3 years ago
- An Open Source Multi Site Automated Social Media Phishing Framework☆150Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 10 months ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆22Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆220Updated 7 years ago
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- ☆60Updated 7 years ago
- Modern problems require modern solutions☆32Updated 2 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆139Updated 5 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆133Updated last week
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆164Updated 2 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆66Updated 4 years ago