UndeadSec / SocialFishView external linksLinks
Phishing Tool & Information Collector
☆4,658Oct 29, 2024Updated last year
Alternatives and similar repositories for SocialFish
Users that are interested in SocialFish are comparing it to the libraries listed below
Sorting:
- An app to remote control SocialFish.☆564Jun 5, 2023Updated 2 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,104Jan 5, 2026Updated last month
- Phishing Campaign Toolkit☆2,505Jul 29, 2025Updated 6 months ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,243Apr 26, 2022Updated 3 years ago
- Open-Source Phishing Toolkit☆13,561Sep 23, 2024Updated last year
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,368Aug 21, 2024Updated last year
- ☆707Sep 10, 2024Updated last year
- Advanced Phishing tool☆3,711Oct 12, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,997Mar 17, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,529Oct 21, 2024Updated last year
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,405Jan 9, 2024Updated 2 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,099Apr 5, 2019Updated 6 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,011Sep 16, 2025Updated 4 months ago
- Accurately Locate Smartphones using Social Engineering☆9,040May 7, 2025Updated 9 months ago
- Attack Surface Management Platform☆9,378Jan 12, 2026Updated last month
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,541Jul 31, 2024Updated last year
- The Rogue Access Point Framework☆14,420Feb 4, 2025Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,566Apr 21, 2025Updated 9 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- Hijack services that relies on QR Code Authentication.☆270Dec 20, 2023Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,578Jun 20, 2024Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆438Apr 26, 2022Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,087Dec 9, 2025Updated 2 months ago
- Generate Professional Phishing Emails Fast And Easy☆1,360May 1, 2025Updated 9 months ago
- Ruby on Rails Phishing Framework☆879Nov 7, 2023Updated 2 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,508Feb 5, 2026Updated last week
- Efficient and advanced man in the middle framework☆2,162Mar 23, 2023Updated 2 years ago
- List of Awesome Red Teaming Resources☆7,746Dec 28, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,050Dec 6, 2023Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,714Oct 8, 2023Updated 2 years ago
- Inject malicious code into *.debs☆283Apr 26, 2022Updated 3 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,837Aug 15, 2023Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,389Feb 10, 2021Updated 5 years ago
- Exploitation Framework for Embedded Devices☆12,964Jun 10, 2025Updated 8 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,899Jan 24, 2024Updated 2 years ago