ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
☆1,137Apr 5, 2019Updated 7 years ago
Alternatives and similar repositories for I-See-You
Users that are interested in I-See-You are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hijack services that relies on QR Code Authentication.☆274Dec 20, 2023Updated 2 years ago
- ☆717Sep 10, 2024Updated last year
- Grab target's webcam shots by link☆1,263Jun 18, 2024Updated last year
- Phishing Tool & Information Collector☆4,719Oct 29, 2024Updated last year
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆542Dec 13, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GPS Location Tracker (Android, IOS, Windows phones.☆17Oct 25, 2022Updated 3 years ago
- Tool to check if an app is installed on the target device through a link☆131Mar 13, 2020Updated 6 years ago
- Script that generates an Android App to hack SMS through WAN☆409Jan 15, 2025Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆391May 4, 2020Updated 6 years ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,352Jan 6, 2026Updated 4 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,828Oct 21, 2024Updated last year
- rang3r | Multi Thread IP + Port Scanner☆131Oct 28, 2023Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,259Apr 26, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Accurately Locate Smartphones using Social Engineering☆9,368May 7, 2025Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,227Feb 6, 2022Updated 4 years ago
- Generate Professional Phishing Emails Fast And Easy☆1,390May 1, 2025Updated last year
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,259Mar 19, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,024Oct 6, 2025Updated 7 months ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,753Oct 8, 2021Updated 4 years ago
- Ruby on Rails Phishing Framework☆891Nov 7, 2023Updated 2 years ago
- Phishing Campaign Toolkit☆2,535Apr 30, 2026Updated last week
- Script to generate Android App that can hijack autenticated sessions in cookies☆203Dec 21, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15,861Aug 21, 2024Updated last year
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,189Oct 20, 2022Updated 3 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,552Mar 28, 2026Updated last month
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,193Mar 17, 2024Updated 2 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,624Apr 21, 2025Updated last year
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,598Jul 31, 2024Updated last year
- Reconnaissance Swiss Army Knife☆2,045Jan 26, 2021Updated 5 years ago
- Introducing "URL Making Technology" to the world for the very FIRST TIME. Give a Mask to Phishing URL like a PRO.. A MUST have tool for P…☆3,091Sep 16, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆2,639Jul 26, 2024Updated last year
- Instagram bruteforce exploit module☆817Mar 29, 2024Updated 2 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,681Sep 26, 2023Updated 2 years ago
- OSINT tool for finding profiles by username☆1,282Nov 16, 2025Updated 5 months ago
- Open Source Information Facebook☆1,203Mar 17, 2021Updated 5 years ago