Generate unicode domains for IDN Homograph Attack and detect them.
☆1,250Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for EvilURL
Users that are interested in EvilURL are comparing it to the libraries listed below
Sorting:
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- Phishing Tool & Information Collector☆4,687Oct 29, 2024Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Python wordlist generator☆181Apr 26, 2022Updated 3 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- ☆523Aug 11, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,409Jan 9, 2024Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,721Oct 8, 2023Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Phishing Campaign Toolkit☆2,522Jul 29, 2025Updated 7 months ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆838May 17, 2024Updated last year
- Intelligent login bruteforcer.☆910Apr 27, 2023Updated 2 years ago
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,420Jul 20, 2020Updated 5 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,566Jul 31, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,086Mar 17, 2024Updated 2 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- An app to remote control SocialFish.☆572Jun 5, 2023Updated 2 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆46May 5, 2019Updated 6 years ago
- Control remote computers using discord bot and python 3.☆183Apr 26, 2022Updated 3 years ago
- Python antivirus evasion tool☆1,449Oct 21, 2023Updated 2 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,310Jan 31, 2022Updated 4 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,613Apr 15, 2025Updated 11 months ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,216Feb 6, 2022Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,721Oct 6, 2025Updated 5 months ago