g0tmi1k / king-phisherLinks
Phishing Campaign Toolkit
☆13Updated 4 years ago
Alternatives and similar repositories for king-phisher
Users that are interested in king-phisher are comparing it to the libraries listed below
Sorting:
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- A tool to harvest credentials from leaked data dump☆79Updated 4 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆80Updated 5 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 6 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆163Updated last year
- A very flexible phone number wordlist generator☆72Updated last year
- Information gathering tool - OSINT☆37Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- wifi attacks suite☆59Updated 5 years ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆133Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆68Updated last week
- OSINT webcam mapping project☆87Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Download airgeddon's required files from github, optionally specify branch and save location☆39Updated 2 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- Ducky Script for Arduino Leonardo Mini & Arduino Uno + Payload to Arduino Converter☆34Updated 7 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆168Updated 3 weeks ago
- Get your USB Rubber Ducky up and running faster☆45Updated 8 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆123Updated last year
- bettercap official documentation and website contents☆38Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- Mana Toolkit - Module for the WiFi Pineapple (NANO/TETRA)☆58Updated 5 years ago
- Interface for the Shodan Computer Search Engine API☆25Updated 5 years ago
- Multiplatform payload dropper☆279Updated 4 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆185Updated 4 years ago
- Useful related to airgeddon packages for Debian based Linux distributions☆55Updated 6 months ago