Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password
☆179Jun 10, 2024Updated last year
Alternatives and similar repositories for thief_raccoon
Users that are interested in thief_raccoon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆194May 17, 2024Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- wp-config-scan☆81Sep 6, 2023Updated 2 years ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Oct 15, 2025Updated 5 months ago
- ☆31Jul 6, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆428Jan 25, 2022Updated 4 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆69Jul 25, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆88May 11, 2024Updated last year
- PacketSpy☆157May 31, 2024Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 9 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with mu…☆81May 24, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A fast subdomain takeover tool☆86Nov 10, 2023Updated 2 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆11Nov 14, 2020Updated 5 years ago
- ☆56Jun 19, 2022Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- A utility for detecting webpage inputs and conducting XSS scans.☆160May 5, 2024Updated last year
- PowerShell Obfuscator☆236Mar 18, 2026Updated last week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- BlackVenom is a personal project designed for ethical ARP and DNS spoofing 🛡️. It helps cybersecurity professionals practice network tra…☆23Jun 21, 2025Updated 9 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Dec 20, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- A fast and comprehensive tool for organizational network scanning☆135Apr 15, 2024Updated last year
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- UnknSMS es un simple script que utiliza la API de https://textbelt.com/ para enviar mensajes de texto (SMS) a un número telefónico de cua…☆40May 10, 2022Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Pentesting Reporting Tool☆595Oct 22, 2024Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Jun 10, 2023Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆76Jan 6, 2026Updated 2 months ago
- ☆305Jun 16, 2024Updated last year
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,316Updated this week
- Uscrapper Vanta: Dive deeper into the web with this powerful open-source tool. Extract valuable insights with ease and efficiency, from b…☆773Nov 24, 2024Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year