defuse / email-spoofing
Ruby script for spoofing SMTP emails.
☆43Updated last year
Related projects: ⓘ
- Massive arsenal of hacker tools...☆75Updated 6 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆10Updated 10 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- ☆19Updated 7 years ago
- Password cracking utility☆52Updated 3 years ago
- A collection of tools for every PENTEST engagement☆12Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆29Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 7 years ago
- Small backdoor using cookie.☆59Updated 7 years ago
- Note:- Run this Script in root user.☆15Updated 6 years ago
- Burp suite HTTP history advanced search☆11Updated 6 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆120Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Web interface for recon-ng☆13Updated 8 years ago
- ☆75Updated 11 months ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆82Updated 3 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆144Updated 3 years ago
- ☆18Updated this week
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 7 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 8 years ago
- Post-Exploitation Framework☆74Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆44Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆43Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆83Updated 9 years ago