Ruby script for spoofing SMTP emails.
☆45Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for email-spoofing
Users that are interested in email-spoofing are comparing it to the libraries listed below
Sorting:
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- Run one process as another under Windows☆11Jul 23, 2022Updated 3 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Tool for controlling the special features of a "U3 smart drive" USB Flash disk.☆12Dec 23, 2015Updated 10 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Apr 14, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Pilot program for CVE submission through GitHub☆21Oct 4, 2023Updated 2 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- A Static Analysis Tool For Android Apps☆20Dec 19, 2025Updated 2 months ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Organizational Material☆10Aug 18, 2020Updated 5 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Jul 3, 2018Updated 7 years ago
- ☆22May 20, 2016Updated 9 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Python util to retrieve full display name and profile picture from a single email address☆103Aug 7, 2021Updated 4 years ago
- Design for an economical and simple air-gapped system.☆27Jun 22, 2014Updated 11 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Repo for autosnort scripts.☆156Oct 11, 2020Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- ☆70Nov 4, 2021Updated 4 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆34Sep 15, 2023Updated 2 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 7 years ago