Security based project. Create a phising page and push it either locally or on-line!
☆17Jun 4, 2023Updated 2 years ago
Alternatives and similar repositories for phishSploit
Users that are interested in phishSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spear Phising Attack With Custom Cloned Website Login Page☆10Nov 18, 2019Updated 6 years ago
- Tools Termux Phising By ArdiGans Official🏃☆13Jun 27, 2021Updated 4 years ago
- Protect your users against malware and phishing threats using Google Safe Browsing☆21Mar 4, 2019Updated 7 years ago
- A Lisp Interpreter written in ABAP☆11Jul 9, 2015Updated 10 years ago
- ☆13Jun 25, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- tkinter (e)xtension☆20Nov 28, 2022Updated 3 years ago
- ☆18Oct 22, 2023Updated 2 years ago
- Arduino library for writing to V.A.G. cluster display over 3line protocol (no can-bus)☆26May 26, 2022Updated 3 years ago
- Remove trackers from links☆14Updated this week
- Autoclicker for Linux based systems and Windows☆26Dec 21, 2025Updated 3 months ago
- Python PDF Generator with Database Connection and Email support☆10Jul 26, 2017Updated 8 years ago
- Repositorio con código fuente de la serie de videos de Firebase en Android en el canal de DevExpert☆14Nov 12, 2023Updated 2 years ago
- WiFi phising attack☆20Jan 18, 2021Updated 5 years ago
- Terminal charts☆40Sep 8, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ZKLibrary is PHP library for reading and writing data to attendance device using UDP protocol. This library useful to comunicate between …☆18Feb 16, 2019Updated 7 years ago
- Command line tool that helps you browse social media more efficiently.☆25Mar 28, 2023Updated 2 years ago
- Different examples of ABAP unit tests☆20May 3, 2023Updated 2 years ago
- A Pinterest Clone made using Flask in Python that deals with pins and has embedded AI at its core.☆15Jul 8, 2021Updated 4 years ago
- How to do Advance Phishing Attacks using Kali Linux☆24May 12, 2021Updated 4 years ago
- You can Get useful information from Websites and do some bypasses like bypassing CloudFlare, Do a whois on websites,Find There Location, …☆16Jan 11, 2021Updated 5 years ago
- Fausse page de connexion faite en PHP, inclu: blacklist IP, redirection au choix, webhook discord, logs. Pour les informations: IP, mdp, …☆34Mar 13, 2022Updated 4 years ago
- Apuntes módulo Puesta en Producción Segura. Curso de especialización en ciberseguridad☆19May 24, 2022Updated 3 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆25Jun 16, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- ☆52Jun 21, 2022Updated 3 years ago
- Scampage / Phising Paypal☆34Feb 28, 2018Updated 8 years ago
- New generation phising tool.☆31Mar 25, 2022Updated 4 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Aug 25, 2024Updated last year
- Most updated UI for google phishing by D4RKH0R1Z0N☆26Mar 17, 2024Updated 2 years ago
- Kubernetes - A Complete DevOps Cookbook, published by Packt☆30Jan 30, 2023Updated 3 years ago
- ☆37May 29, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- For Phising Instagram and Other social medias....☆27Jan 29, 2024Updated 2 years ago
- ☆12May 31, 2023Updated 2 years ago
- Documentation and more info☆29Sep 11, 2024Updated last year
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 8 months ago
- Pest Mutate Plugin☆40Feb 17, 2026Updated last month
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago