☆230Jun 23, 2023Updated 2 years ago
Alternatives and similar repositories for MaxPhisher
Users that are interested in MaxPhisher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Files for maxphisher☆21Dec 30, 2023Updated 2 years ago
- ☆375Jun 26, 2024Updated last year
- ☆72Apr 29, 2023Updated 2 years ago
- ☆13Apr 29, 2023Updated 2 years ago
- A python phishing script for login phishing, image phishing, video phishing and many more☆13Dec 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- One of the best instagram bruteforce attack program☆20Jul 21, 2024Updated last year
- A phishing attack tool that ready to use and work perfectly with 6 updated templates.☆150Dec 21, 2023Updated 2 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆25Mar 11, 2026Updated 2 weeks ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆13Nov 25, 2022Updated 3 years ago
- My awesome Readme.md☆322Mar 18, 2026Updated last week
- All proxy list, 100000 proxies in proxy.txt☆24Apr 16, 2022Updated 3 years ago
- X-overdos is a A tool for performing DoS attack tests with many methods such as Layer 2, Layer 4, and also Layer 7.☆11Oct 16, 2025Updated 5 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆26Aug 2, 2025Updated 7 months ago
- ☆13Apr 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- Shell in development with personal tools.☆11Apr 18, 2025Updated 11 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆18Dec 24, 2025Updated 3 months ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆12Mar 29, 2019Updated 7 years ago
- A python script that creates ducky script for unlocking android device lock screen.☆26Apr 4, 2022Updated 3 years ago
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆30Jun 3, 2024Updated last year
- Simple lock screen, power down widget, any key to unlock and more☆20Feb 22, 2011Updated 15 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Aug 13, 2021Updated 4 years ago
- Facebook Hacking Toolkit - v1.0.1 (BETA)☆31Feb 10, 2024Updated 2 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Gmail-Brute Force Tool ;)☆52Feb 7, 2024Updated 2 years ago
- Create your own password list☆42Jan 16, 2024Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆54Mar 29, 2025Updated last year
- ☆22Nov 13, 2025Updated 4 months ago
- A USB RubberDucky payload that steals Wi-Fi credentials and sends them to the attacker via STMP☆10Dec 16, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆14Feb 21, 2025Updated last year
- Triangulate position based on cell towers position and signal strength☆20Apr 8, 2015Updated 10 years ago
- ☆14Oct 1, 2024Updated last year
- Wordpress Hunting Vulnerabilities and Bruteforce tool using Google Dork☆14Sep 16, 2021Updated 4 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- VidPhisher is a phishing tool. It will generate a link. If anyone opens the link and permits camera access, his/her video will be capture…☆16Mar 14, 2023Updated 3 years ago