Phishing Tool & Information Collector
☆4,672Oct 29, 2024Updated last year
Alternatives and similar repositories for SocialFish
Users that are interested in SocialFish are comparing it to the libraries listed below
Sorting:
- An app to remote control SocialFish.☆567Jun 5, 2023Updated 2 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,114Jan 5, 2026Updated last month
- Phishing Campaign Toolkit☆2,508Jul 29, 2025Updated 6 months ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,248Apr 26, 2022Updated 3 years ago
- Open-Source Phishing Toolkit☆13,585Sep 23, 2024Updated last year
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,447Aug 21, 2024Updated last year
- ☆710Sep 10, 2024Updated last year
- Advanced Phishing tool☆3,725Oct 12, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,645Oct 6, 2025Updated 4 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,589Oct 21, 2024Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,408Jan 9, 2024Updated 2 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,108Apr 5, 2019Updated 6 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,029Sep 16, 2025Updated 5 months ago
- Accurately Locate Smartphones using Social Engineering☆9,094May 7, 2025Updated 9 months ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated last week
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,555Jul 31, 2024Updated last year
- The Rogue Access Point Framework☆14,450Feb 4, 2025Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,573Apr 21, 2025Updated 10 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Hijack services that relies on QR Code Authentication.☆271Dec 20, 2023Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,595Jun 20, 2024Updated last year
- Generate Professional Phishing Emails Fast And Easy☆1,370May 1, 2025Updated 9 months ago
- Chrome Keylogger Extension | Post Exploitation Tool☆439Apr 26, 2022Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,090Dec 9, 2025Updated 2 months ago
- Ruby on Rails Phishing Framework☆881Nov 7, 2023Updated 2 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,943Mar 22, 2024Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,536Updated this week
- Efficient and advanced man in the middle framework☆2,168Mar 23, 2023Updated 2 years ago
- List of Awesome Red Teaming Resources☆7,788Dec 28, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,713Oct 8, 2023Updated 2 years ago
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,896Aug 15, 2023Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,392Feb 10, 2021Updated 5 years ago
- Exploitation Framework for Embedded Devices☆12,985Jun 10, 2025Updated 8 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago