averagesecurityguy / Phishing
Scripts used for phishing campaigns
☆14Updated 10 years ago
Alternatives and similar repositories for Phishing:
Users that are interested in Phishing are comparing it to the libraries listed below
- PHP Phishing Framework☆28Updated 11 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Search bing with python☆12Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Hacking environment installation scripts for OS X☆25Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Various exploits☆10Updated 7 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Network white noise collector☆18Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago