ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
☆1,120Apr 5, 2019Updated 6 years ago
Alternatives and similar repositories for I-See-You
Users that are interested in I-See-You are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hijack services that relies on QR Code Authentication.☆272Dec 20, 2023Updated 2 years ago
- ☆710Sep 10, 2024Updated last year
- Grab target's webcam shots by link☆1,260Jun 18, 2024Updated last year
- Phishing Tool & Information Collector☆4,692Oct 29, 2024Updated last year
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆530Dec 13, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GPS Location Tracker (Android, IOS, Windows phones.☆17Oct 25, 2022Updated 3 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- Script that generates an Android App to hack SMS through WAN☆397Jan 15, 2025Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆441Apr 26, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆389May 4, 2020Updated 5 years ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,325Jan 6, 2026Updated 2 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,703Oct 21, 2024Updated last year
- rang3r | Multi Thread IP + Port Scanner☆128Oct 28, 2023Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,252Apr 26, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Accurately Locate Smartphones using Social Engineering☆9,172May 7, 2025Updated 10 months ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,215Feb 6, 2022Updated 4 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,374May 1, 2025Updated 10 months ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,246Mar 19, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,756Oct 6, 2025Updated 5 months ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,713Oct 8, 2021Updated 4 years ago
- Ruby on Rails Phishing Framework☆886Nov 7, 2023Updated 2 years ago
- Phishing Campaign Toolkit☆2,529Jul 29, 2025Updated 8 months ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆195Dec 21, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,598Aug 21, 2024Updated last year
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,180Oct 20, 2022Updated 3 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,519Sep 30, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,584Apr 21, 2025Updated 11 months ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,571Jul 31, 2024Updated last year
- Reconnaissance Swiss Army Knife☆2,023Jan 26, 2021Updated 5 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,054Sep 16, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Detect evil urls that uses IDN Homograph Attack.☆206Jan 24, 2018Updated 8 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆2,617Jul 26, 2024Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,626Sep 26, 2023Updated 2 years ago
- Instagram bruteforce exploit module☆817Mar 29, 2024Updated 2 years ago
- OSINT tool for finding profiles by username☆1,266Nov 16, 2025Updated 4 months ago
- Open Source Information Facebook☆1,190Mar 17, 2021Updated 5 years ago