milo2012 / Social-Engineering-Toys
Social Engineering Toys
☆36Updated 9 years ago
Alternatives and similar repositories for Social-Engineering-Toys
Users that are interested in Social-Engineering-Toys are comparing it to the libraries listed below
Sorting:
- ☆24Updated 9 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- ☆47Updated 9 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- ☆19Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- ☆81Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago