SpookySec / OSINTed
an easy to-use Open Source Intelligence framework
☆67Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for OSINTed
- PhishX - The Complete Spear Phishing Tool☆91Updated 6 years ago
- Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standa…☆64Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Herramientas phishing todo en uno.☆40Updated 4 years ago
- Phising 2FA Gmail☆95Updated 2 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆81Updated 11 months ago
- Automated Payload Generator Tool☆101Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 5 years ago
- Bruteforce script to bruteforce Login authentication pages. ( made for ctf )☆74Updated last month
- Simple Python IP Tracker☆80Updated 6 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆125Updated 4 years ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆100Updated 2 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆77Updated 2 years ago
- Simple script masks the phishing link under the normal URL☆76Updated 3 years ago
- Backdoor Generator | Linux & Windows | FUD AV .py .exe☆103Updated 4 years ago
- Succeser of blackeye v1.0, phishing tool with new 10 page added☆104Updated 2 years ago
- ☆55Updated 4 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆97Updated 2 years ago
- A Hackers framework☆117Updated 7 years ago
- Sencilla Herramienta la cual usa 2 tipos de técnicas para Desconectar a dispositivos conectados a una red por tiempo ilimitado. Herramien…☆45Updated last year
- Espionaje y recopilación de Información☆92Updated 2 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆61Updated 4 years ago
- Fast exploitation based on metasploit.☆76Updated 4 years ago
- Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber...☆75Updated 2 years ago