micro-joan / Zphisher-GUI-Back_office
A Zphisher GUI Back-Office Plugin
☆204Updated 11 months ago
Related projects: ⓘ
- GUI Osint Framework with Kali Linux☆131Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated 2 weeks ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆227Updated 2 weeks ago
- Python Gmail User Enumeration Tool☆112Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆134Updated 3 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆279Updated 8 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆108Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆187Updated 2 weeks ago
- An OSINT Framework project based on Python☆98Updated 3 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆62Updated 2 weeks ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆163Updated 2 weeks ago
- ☆55Updated 4 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- ☆63Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆204Updated 8 months ago
- Shodan Dorks☆176Updated 3 weeks ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆49Updated 3 years ago
- Automated exploit scanner for cameras on the internet☆166Updated 6 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆81Updated last year
- Scripts for offensive security☆59Updated 3 weeks ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆161Updated 10 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- Use Instagram location features to track an account☆223Updated 8 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆148Updated 3 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆91Updated 8 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…