chenjj / espooferLinks
An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.π»
β1,661Updated 3 years ago
Alternatives and similar repositories for espoofer
Users that are interested in espoofer are comparing it to the libraries listed below
Sorting:
- evilginx3 + gophishβ1,932Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkitβ619Updated 8 months ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.β651Updated 5 months ago
- Linux/Windows post-exploitation framework made by linux userβ1,667Updated last week
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.β1,036Updated last year
- mip22 is a advanced phishing toolβ650Updated last year
- This is a collection of phishing templates and a landing page to be used with goPhishβ440Updated 3 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,560Updated 4 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposesβ786Updated 11 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.β2,346Updated last week
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoorβ2,420Updated last year
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handlerβ1,229Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript filesβ2,357Updated last year
- An XSS exploitation command-line interface and payload generator.β1,406Updated 11 months ago
- Automating Host Exploitation with AIβ547Updated 3 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.β1,039Updated last month
- Ready to go Phishing Platformβ1,086Updated 8 months ago
- Generate Professional Phishing Emails Fast And Easyβ1,344Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,474Updated 3 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,568Updated last month
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.β1,737Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug huβ¦β2,297Updated last year
- All In One Web Reconβ2,605Updated 8 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconβ¦β1,054Updated last year
- File upload vulnerability scanner and exploitation tool.β3,285Updated 8 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,917Updated 3 years ago
- Starkiller is a Frontend for PowerShell Empire.β1,597Updated last month
- Rockyou for web fuzzingβ2,992Updated 4 months ago
- A collaborative, multi-platform, red teaming frameworkβ4,220Updated last week
- Generates millions of keyword-based password mutations in seconds.β1,401Updated 7 months ago