Social engineering credential harvester
☆17Oct 4, 2021Updated 4 years ago
Alternatives and similar repositories for GoPhish
Users that are interested in GoPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a proof-of-concept application that utilizes the OpenAI API to embed the secrets of a LLM's knowledge.☆12Jun 5, 2023Updated 2 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆46Apr 3, 2018Updated 8 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆29Mar 11, 2026Updated last month
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 4 years ago
- ☆10Sep 29, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- MATA-SERVER is the web server version of the MATA visitor bot, designed for simulating website traffic. This complements the terminal-bas…☆14Jan 2, 2025Updated last year
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- Best Google Dorker Available☆42Oct 3, 2024Updated last year
- Code repository for WiFi Hacking: Wireless Penetration Testing for Beginners, published by Packt☆15Jan 30, 2023Updated 3 years ago
- A Node.js-based payment gateway integration for Trakteer.id, supporting multiple payment methods including QRIS, e-wallets, virtual accou…☆13Oct 29, 2024Updated last year
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- A social engineering toolkit for performing smishing, and other sms attacks☆108Jun 26, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Social Engineering Tool☆81Oct 28, 2024Updated last year
- This script is for termux beginners who started termux for learn about ethical hacking. In this script contains all important tool for te…☆15Dec 14, 2019Updated 6 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆94Jul 1, 2019Updated 6 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- 🔐A web panel for controlling an OpenVPN server☆17Apr 9, 2019Updated 7 years ago
- ✓ Using scapy and nmap tools, find out ip/port, ARP SPOOFING & TCP SESSION HIJACKING ✓ Using snort tool provided Intrusion Detection Syst…☆10Oct 29, 2019Updated 6 years ago
- Packer and Vagrant configurations for Kali Linux☆14Jun 26, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cybersecurity - a python3 script to parse and analyze .msg and .eml email files☆14Jan 8, 2020Updated 6 years ago
- Gathers public information on companies to highlight social engineering risk.☆31May 25, 2016Updated 9 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆48Jul 17, 2017Updated 8 years ago
- Xfinity WiFi Honeypot / Credential Harvester☆24Jun 28, 2017Updated 8 years ago
- Files and Tools associated with Practical Social Engineering (2020) (c) NoStarch Press and Joe Gray☆29May 2, 2022Updated 3 years ago
- The Social-Engineer Toolkit (SET) Copyright 2015 The Social-Engineer Toolkit (SET) Written by: David Kennedy (ReL1K) Company: TrustedS…☆23Jan 1, 2016Updated 10 years ago
- ☆11Mar 25, 2024Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆41Feb 21, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to …☆26Jun 16, 2021Updated 4 years ago
- A Terraform module for deploying a Talos cluster on vSphere☆17Apr 7, 2021Updated 5 years ago
- OBS Dockable Panels for controlling PTZOptics cameras☆11Jul 26, 2021Updated 4 years ago
- An addon to import users from active directory to gophish☆18Mar 22, 2022Updated 4 years ago
- Monitor Panel Hosting, Web Server, List Domain, Virtual Host... and automatically add them into vDDoS Proxy Protection☆10Apr 27, 2022Updated 3 years ago
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 5 years ago
- Password Manager☆11Nov 1, 2017Updated 8 years ago