defuse / email-spoofing
Ruby script for spoofing SMTP emails.
☆43Updated 2 years ago
Alternatives and similar repositories for email-spoofing:
Users that are interested in email-spoofing are comparing it to the libraries listed below
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆19Updated 7 years ago
- Ruby based reverse IP-lookup tool.☆56Updated 4 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆12Updated 10 years ago
- A collection of tools for every PENTEST engagement☆12Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Burp suite HTTP history advanced search☆11Updated 7 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 8 months ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- ☆79Updated last year
- Python tool for Dorking☆11Updated last year
- Create lists from nmap output.☆13Updated 4 years ago