Viralmaniar / I-See-YouView external linksLinks
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
☆1,099Apr 5, 2019Updated 6 years ago
Alternatives and similar repositories for I-See-You
Users that are interested in I-See-You are comparing it to the libraries listed below
Sorting:
- Hijack services that relies on QR Code Authentication.☆271Dec 20, 2023Updated 2 years ago
- ☆707Sep 10, 2024Updated last year
- Grab target's webcam shots by link☆1,245Jun 18, 2024Updated last year
- Phishing Tool & Information Collector☆4,658Oct 29, 2024Updated last year
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆520Dec 13, 2018Updated 7 years ago
- rang3r | Multi Thread IP + Port Scanner☆124Oct 28, 2023Updated 2 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆438Apr 26, 2022Updated 3 years ago
- Tool to check if an app is installed on the target device through a link☆123Mar 13, 2020Updated 5 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,245Apr 26, 2022Updated 3 years ago
- Script that generates an Android App to hack SMS through WAN☆392Jan 15, 2025Updated last year
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,498Sep 30, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,040May 7, 2025Updated 9 months ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,172Oct 20, 2022Updated 3 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,552Oct 21, 2024Updated last year
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,541Jul 31, 2024Updated last year
- Generate Professional Phishing Emails Fast And Easy☆1,365May 1, 2025Updated 9 months ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,593Sep 26, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,007Jan 26, 2021Updated 5 years ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,283Jan 6, 2026Updated last month
- Automatically exported from code.google.com/p/ghost-phisher☆386May 4, 2020Updated 5 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,997Mar 17, 2024Updated last year
- A OSINT tool to obtain a target's phone number just by having his email address☆2,585Jul 26, 2024Updated last year
- Open Source Information Facebook☆1,179Mar 17, 2021Updated 4 years ago
- All In One Web Recon☆2,653Apr 30, 2025Updated 9 months ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,567Apr 21, 2025Updated 9 months ago
- Phishing Campaign Toolkit☆2,505Jul 29, 2025Updated 6 months ago
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- OSINT tool for finding profiles by username☆1,247Nov 16, 2025Updated 3 months ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,368Aug 21, 2024Updated last year
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,011Sep 16, 2025Updated 5 months ago
- Ruby on Rails Phishing Framework☆880Nov 7, 2023Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,246Mar 9, 2020Updated 5 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,236Mar 19, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆194Dec 21, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,209Feb 6, 2022Updated 4 years ago
- GPS Location Tracker (Android, IOS, Windows phones.☆17Oct 25, 2022Updated 3 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆118Mar 18, 2019Updated 6 years ago