dr1nk0rdi3 / phishreportLinks
phishing reporting tool
☆15Updated 6 years ago
Alternatives and similar repositories for phishreport
Users that are interested in phishreport are comparing it to the libraries listed below
Sorting:
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- ☆19Updated 8 years ago
- ☆9Updated 5 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆48Updated last year
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Red Login: SSH Brute-force Tools☆103Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Hash Generator & Cracker☆38Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆19Updated 6 years ago
- Gathering Email Information Tool☆37Updated 8 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Web application backdoor builder☆72Updated 4 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- Automated Tools Pentest☆7Updated 2 years ago