chenjj / espooferLinks
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
β1,640Updated 3 years ago
Alternatives and similar repositories for espoofer
Users that are interested in espoofer are comparing it to the libraries listed below
Sorting:
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.β641Updated 3 months ago
- SniperPhish - The Web-Email Spear Phishing Toolkitβ613Updated 6 months ago
- evilginx3 + gophishβ1,901Updated last year
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.β1,031Updated 11 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,543Updated 4 years ago
- This is a collection of phishing templates and a landing page to be used with goPhishβ432Updated 3 years ago
- mip22 is a advanced phishing toolβ645Updated last year
- Starkiller is a Frontend for PowerShell Empire.β1,572Updated 2 months ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposesβ765Updated 9 months ago
- Linux/Windows post-exploitation framework made by linux userβ1,635Updated 3 weeks ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconβ¦β1,047Updated last year
- fully automated pentesting toolβ515Updated 2 years ago
- Image Payload Creating/Injecting toolsβ1,264Updated last year
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handlerβ1,230Updated 3 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPSβ¦β708Updated 2 years ago
- All In One Web Reconβ2,542Updated 6 months ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposesβ1,145Updated 2 years ago
- Phishing Campaign Toolkitβ2,468Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,468Updated 3 years ago
- An XSS exploitation command-line interface and payload generator.β1,399Updated 9 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.β1,024Updated 2 weeks ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other fβ¦β2,289Updated last year
- Leaked pentesting manuals given to Conti ransomware crooksβ1,065Updated 4 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.β2,320Updated this week
- OSINT tool - gets data from services like shodan, censys etc. in one appβ652Updated 2 years ago
- Generate Professional Phishing Emails Fast And Easyβ1,288Updated 6 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β4,885Updated 2 months ago
- The Shadow Attack Frameworkβ1,119Updated 3 years ago
- Search for leaked credentialsβ1,363Updated 4 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.β2,040Updated 4 months ago