LinkSec / phishing-templates
Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!
☆16Updated 8 months ago
Alternatives and similar repositories for phishing-templates:
Users that are interested in phishing-templates are comparing it to the libraries listed below
- Social Engineering Browser Update Attack.☆55Updated last year
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆42Updated 7 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆118Updated 9 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- ☆15Updated 2 years ago
- Automated Social Media Phishing Tool. Automated tool that allow us to hack accounts with 2FA Bypass.☆21Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆76Updated 8 months ago
- Simple Tool for webhacking☆11Updated last year
- Browser streaming MITM proxy☆57Updated last year
- This is power full BotNet☆40Updated last year
- Dogma V1.5.3☆28Updated 5 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆18Updated 2 years ago
- Hacking with PasteJacking technique☆21Updated 8 months ago
- Here are +200 different rats some with source code☆90Updated last year
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆70Updated last year
- 🪝Hacking Social Media Accounts by using Phishing Mails (GoPhish) 🐬☆58Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆127Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 5 months ago
- 🔮 Python Remote administration tool via telegram☆47Updated 11 months ago
- L3MON Legacy - Remote Android Management Suite☆28Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆65Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year