UndeadSec / SocialFishLinks
Phishing Tool & Information Collector
β4,653Updated last year
Alternatives and similar repositories for SocialFish
Users that are interested in SocialFish are comparing it to the libraries listed below
Sorting:
- Th3Inspector π΅οΈ Best Tool For Information Gathering πβ2,565Updated 9 months ago
- This is Advance Phishing Tool ! OTP PHISHINGβ3,101Updated last month
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for Pβ¦β2,998Updated 4 months ago
- Advanced Phishing toolβ3,703Updated 3 years ago
- SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghiβ1,896Updated 2 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exβ¦β1,097Updated 6 years ago
- Phishing Campaign Toolkitβ2,501Updated 6 months ago
- Tools for Pentestingβ2,123Updated 2 years ago
- UFONet - Denial of Service Toolkitβ2,426Updated last year
- Generate unicode domains for IDN Homograph Attack and detect them.β1,241Updated 3 years ago
- Generate Gmail Emailing Keyloggers to Windows.β1,143Updated 3 years ago
- Generate Professional Phishing Emails Fast And Easyβ1,356Updated 9 months ago
- Hacking tools pack & backdoors generator.β1,975Updated 11 months ago
- Automatically brute force all services running on a target.β2,203Updated last year
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testersβ3,526Updated last year
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on βLoginβ¦β1,500Updated 5 months ago
- β1,065Updated 3 years ago
- Efficient and advanced man in the middle frameworkβ2,157Updated 2 years ago
- The LAZY script will make your life easier, and of course faster.β4,304Updated 4 years ago
- X Attacker Tool β£ Website Vulnerability Scanner & Auto Exploiterβ1,711Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.β3,274Updated 3 months ago
- HiddenEye Reborn in better shape than ever, rewritten from scratch and adapted to modern worldβ739Updated last year
- Websploit is a high level MITM frameworkβ1,226Updated 2 years ago
- Grab target's webcam shots by linkβ1,244Updated last year
- Python Remote Administration Tool (RAT)β3,516Updated 2 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addressesβ2,488Updated 2 years ago
- Powerful framework for rogue access point attack.β2,374Updated 2 years ago
- An app to remote control SocialFish.β562Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy β¦β1,243Updated 5 years ago
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}β4,764Updated last year