ggulgun / SMASH
This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media accounts. Deep learning methods are used in this project. Besides, the model is trained with the social media messages of the people and new messages are created with this model. Malicious links are designed fo…
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SMASH
- E-mails, subdomains and names Harvester - OSINT☆13Updated 6 years ago
- Information gathering tool - OSINT☆33Updated 5 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Angry IP Scanner Jar File☆24Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆28Updated 7 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 6 years ago
- Python - Metasploit-Framework Database Management☆15Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- Find details of any mobile number in india.☆20Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Pentest ToolKit☆27Updated 4 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Metasploit Framework☆10Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- Hidden Friends Finder (HFF) for Facebook☆65Updated last year
- A swiss army knife for pentesting Windows/Active Directory environments☆13Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆43Updated 2 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Passwords Recovery Tool☆15Updated 5 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆27Updated 6 years ago
- A collection of spywares for education scopes☆39Updated 7 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 5 years ago
- Massive arsenal of hacker tools...☆76Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Updated 10 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆95Updated 7 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆18Updated 2 months ago