averagesecurityguy / PhishingLinks
Scripts used for phishing campaigns
☆14Updated 11 years ago
Alternatives and similar repositories for Phishing
Users that are interested in Phishing are comparing it to the libraries listed below
Sorting:
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Updated 5 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 8 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- Exploit Pack - One step ahead☆12Updated 12 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Updated 12 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Hacking environment installation scripts for OS X☆28Updated 3 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- ☆12Updated 11 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Various exploits☆10Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- Phishing Toolkit☆19Updated 7 years ago