Phishing application to aid in sending emails more simply and allowing for more control over settings.
☆106May 30, 2017Updated 8 years ago
Alternatives and similar repositories for PyPhishing
Users that are interested in PyPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- The "bot" component of the PlugBot project☆277Feb 2, 2022Updated 4 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- This is the Command & Control component of the PlugBot project☆102Feb 15, 2022Updated 4 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆311Oct 22, 2016Updated 9 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆269Mar 7, 2021Updated 5 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago