kevthehermit / SpearPhisherLinks
A Web Application to Send and Track Spear Phishing Campaigns
☆103Updated 8 years ago
Alternatives and similar repositories for SpearPhisher
Users that are interested in SpearPhisher are comparing it to the libraries listed below
Sorting:
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆242Updated 5 years ago
- Templates for the King Phisher open source phishing campaign toolkit.☆177Updated 6 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Updated 6 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Maltego Local Transforms for Facebook☆76Updated 7 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆46Updated 10 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Darknet OSINT Transform☆124Updated 7 years ago
- ☆82Updated 2 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- Maltego Penetration Testing Transforms☆375Updated 6 years ago
- Social engineering tool for human hacking☆123Updated 9 years ago
- Python OSINT Tool to retrieve information from Skype☆77Updated 10 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 10 years ago
- Orb is a massive footprinting tool.☆50Updated 5 years ago
- Find phishing kits which use your brand/organization's files and image.☆241Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 7 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Updated 6 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 4 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆104Updated 8 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆87Updated 9 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Updated 10 years ago