andpalmier / phishfloodLinks
Pollute phishing kits with fake credentials
☆11Updated 4 years ago
Alternatives and similar repositories for phishflood
Users that are interested in phishflood are comparing it to the libraries listed below
Sorting:
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- ☆53Updated 4 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- ☆33Updated 10 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆67Updated 4 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Updated 6 months ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Updated 8 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 2 years ago
- Fraud prevention tool☆28Updated 5 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆119Updated 6 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Visualize networks of phishing by querying the phishstats.info API☆78Updated last year
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 3 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆28Updated 5 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 6 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Snort_rules detection bad actors.☆29Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last week
- ☆14Updated 6 months ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 7 years ago