Tanmay-Tiwaricyber / tphisherView external linksLinks
An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
☆107Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for tphisher
Users that are interested in tphisher are comparing it to the libraries listed below
Sorting:
- ☆11Dec 20, 2022Updated 3 years ago
- Infect Any Android Device With Virus From Link In Termux☆11Oct 1, 2023Updated 2 years ago
- Meterpreter payload for all platforms☆74Jan 2, 2022Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- An OSINT tool to find user's all over the internet including social media platforms☆108Oct 10, 2023Updated 2 years ago
- Hacking Tools☆87Jun 29, 2023Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆114Jan 2, 2022Updated 4 years ago
- Cam VIrus shoots from the target's phone front camera or PC webcam just sending a link.☆98Sep 15, 2021Updated 4 years ago
- Cam-dumper is a written tool in the language of Python program for hacking CCTV cameras that can access cameras in 20 countries☆197Jan 26, 2025Updated last year
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- This script will you help to find the information about the website and to help in penetrating testing☆112Sep 27, 2025Updated 4 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Jul 31, 2023Updated 2 years ago
- Proxy in terminal, hide you ip address.☆23Jul 30, 2023Updated 2 years ago
- Termux Auto-Metasploit☆63Jan 2, 2022Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Cross-platform RAT, written in C☆88Oct 8, 2022Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Quickly create a list of dorks based on variables entered.☆17Oct 8, 2024Updated last year
- An extreme encryption for everyone, encrypt your text before sending to anyone. Alphabets and numbers are going to be encrypted like a he…☆15Jul 31, 2024Updated last year
- Deface HTML Page Generator☆106May 27, 2025Updated 8 months ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link. Author will not be responsible for any misuse of this t…☆136Jul 1, 2025Updated 7 months ago
- A small script to find the exact Geo-location of IP☆38Nov 21, 2022Updated 3 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆41Mar 26, 2022Updated 3 years ago
- 100% working Phishing Tool (38 websites)☆549May 27, 2025Updated 8 months ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- GeoIP plotting script written in Python to help security teams draw visualized reports from IP addresses☆20May 29, 2022Updated 3 years ago
- mift - a mobile image forensic toolkit☆46Nov 14, 2023Updated 2 years ago
- An Advanced tool to Crack Any Password Protected PDF file. A very user friendly script especially for noob hackers.☆74Aug 15, 2023Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Oct 28, 2025Updated 3 months ago
- test☆67Jan 9, 2022Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago