chenjj / espooferLinks
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻
☆1,595Updated 3 years ago
Alternatives and similar repositories for espoofer
Users that are interested in espoofer are comparing it to the libraries listed below
Sorting:
- SniperPhish - The Web-Email Spear Phishing Toolkit☆589Updated 2 months ago
- evilginx3 + gophish☆1,832Updated last year
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆609Updated 2 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆994Updated 8 months ago
- mip22 is a advanced phishing tool☆628Updated 11 months ago
- Generate Professional Phishing Emails Fast And Easy☆1,248Updated 2 months ago
- Linux/Windows post-exploitation framework made by linux user☆1,590Updated 3 weeks ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,197Updated 2 years ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆418Updated 3 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,518Updated 3 years ago
- Phishing Campaign Toolkit☆2,415Updated 11 months ago
- Starkiller is a Frontend for PowerShell Empire.☆1,514Updated last week
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆710Updated 5 months ago
- fully automated pentesting tool☆512Updated 2 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,003Updated 2 years ago
- All In One Web Recon☆2,484Updated 2 months ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆856Updated 9 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆999Updated 11 months ago
- Automating Host Exploitation with AI☆539Updated 2 years ago
- The Shadow Attack Framework☆1,111Updated 2 years ago
- Search for leaked credentials☆1,341Updated 4 years ago
- Ready to go Phishing Platform☆994Updated 2 months ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆646Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,453Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,206Updated 3 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,364Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,225Updated 2 months ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆697Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,973Updated 3 weeks ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year