SimplySecurity / SimplyEmailLinks
Email recon made fast and easy, with a framework to build on
☆952Updated 3 years ago
Alternatives and similar repositories for SimplyEmail
Users that are interested in SimplyEmail are comparing it to the libraries listed below
Sorting:
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆650Updated 3 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆627Updated 7 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago
- A python based LinkedIn enumeration tool☆568Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- ☆524Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,016Updated 8 years ago
- wide range mass audit toolkit☆1,032Updated 7 years ago
- for mass exploiting☆613Updated 3 years ago
- Ruby on Rails Phishing Framework☆873Updated 2 years ago
- WebApp Information Gatherer☆551Updated 7 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆634Updated last month
- SpeedPhishing Framework☆448Updated 6 years ago
- Find exploits in local and online databases instantly☆1,796Updated 4 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380Updated 5 years ago
- Scripts I use during pentest engagements.☆1,020Updated 5 years ago
- A default credential scanner.☆1,501Updated 6 months ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆539Updated 6 years ago
- Auto Scanning to SSL Vulnerability☆633Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,112Updated 8 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆653Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,741Updated last month
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,786Updated 3 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 4 years ago
- information gathering via dorks☆400Updated 3 years ago
- ☆615Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,392Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,432Updated 7 years ago