Automatically spin up infra for phishing
☆63Feb 1, 2020Updated 6 years ago
Alternatives and similar repositories for phish_composer
Users that are interested in phish_composer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- TypeScript/JavaScript client libraries for Sliver☆27Apr 17, 2026Updated 2 weeks ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆52Dec 8, 2022Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆11Jun 18, 2025Updated 10 months ago
- whois command implemented by golang with awesome whois servers list☆63Jun 1, 2023Updated 2 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and int…☆21Jul 4, 2025Updated 10 months ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆37Apr 15, 2019Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 7 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆12Mar 20, 2023Updated 3 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 11 months ago
- RPi.GPIO for Odroid c1, c2, xu4☆12Apr 2, 2018Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆53Feb 28, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- penGUI take cure of eggs!☆10Jun 22, 2024Updated last year
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- bingip2hosts is a Bing.com web scraper that discovers websites by IP address☆139May 3, 2022Updated 4 years ago
- AI Powered penetration testing Platform for offensive security research☆81Updated this week
- Generate 1337speak based password dictionaries☆12Jul 27, 2018Updated 7 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 5 years ago
- Google Hacking using Prompt ChatGPT☆15Jun 3, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Apr 15, 2022Updated 4 years ago
- Welcome to my Cybersecurity Homelab, where I experiment with ethical hacking, penetration testing, network security, AI Agent automation …☆18Mar 11, 2025Updated last year
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 6 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A simple proxy scraper coded in Python.☆11Feb 4, 2017Updated 9 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 9 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago