ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
☆1,112Apr 5, 2019Updated 6 years ago
Alternatives and similar repositories for I-See-You
Users that are interested in I-See-You are comparing it to the libraries listed below
Sorting:
- Hijack services that relies on QR Code Authentication.☆271Dec 20, 2023Updated 2 years ago
- ☆710Sep 10, 2024Updated last year
- Grab target's webcam shots by link☆1,253Jun 18, 2024Updated last year
- Phishing Tool & Information Collector☆4,677Oct 29, 2024Updated last year
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆525Dec 13, 2018Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 5 years ago
- rang3r | Multi Thread IP + Port Scanner☆126Oct 28, 2023Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,248Apr 26, 2022Updated 3 years ago
- Script that generates an Android App to hack SMS through WAN☆395Jan 15, 2025Updated last year
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,511Sep 30, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,119May 7, 2025Updated 10 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,638Oct 21, 2024Updated last year
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,178Oct 20, 2022Updated 3 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,563Jul 31, 2024Updated last year
- Generate Professional Phishing Emails Fast And Easy☆1,370May 1, 2025Updated 10 months ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,613Sep 26, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,017Jan 26, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆387May 4, 2020Updated 5 years ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,304Jan 6, 2026Updated 2 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,052Mar 17, 2024Updated last year
- A OSINT tool to obtain a target's phone number just by having his email address☆2,600Jul 26, 2024Updated last year
- Open Source Information Facebook☆1,184Mar 17, 2021Updated 4 years ago
- All In One Web Recon☆2,667Apr 30, 2025Updated 10 months ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,576Apr 21, 2025Updated 10 months ago
- Phishing Campaign Toolkit☆2,512Jul 29, 2025Updated 7 months ago
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,038Sep 16, 2025Updated 5 months ago
- OSINT tool for finding profiles by username☆1,256Nov 16, 2025Updated 3 months ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,492Aug 21, 2024Updated last year
- Ruby on Rails Phishing Framework☆882Nov 7, 2023Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,249Mar 9, 2020Updated 6 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,241Mar 19, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,667Oct 6, 2025Updated 5 months ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆195Dec 21, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- GPS Location Tracker (Android, IOS, Windows phones.☆17Oct 25, 2022Updated 3 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆119Mar 18, 2019Updated 6 years ago