nadmk / PHPhisherLinks
PHPhisher: An open source phishing platform
☆10Updated 7 years ago
Alternatives and similar repositories for PHPhisher
Users that are interested in PHPhisher are comparing it to the libraries listed below
Sorting:
- ARP ping detector on local network☆15Updated 12 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Forwards external public ports to internal ports without router access.☆138Updated 12 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
- A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.☆24Updated 10 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆124Updated 7 years ago
- Swiss army knife for (web) security specialists.☆12Updated 7 years ago
- 802.11 radiotap and MPDU parser☆14Updated 7 years ago
- Wrapping up end-to-end code and provide in freedom custom API.☆34Updated 9 years ago
- The shards of code that will soon become the next GooDork version☆17Updated 12 years ago
- MCD's Black Jack is a password cracking tool for linux that cracks md5, sha1, sha256 and sha512 hashes. It uses the Dictionary bruteforci…☆20Updated 5 years ago
- Deprecated. Use CoinHive Stratum instead.☆35Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- JavaScript-compatible Unicode data. Arrays of code points, arrays of symbols, and regular expressions for Unicode v11.0.0’s categories, s…☆16Updated 2 weeks ago
- Get Instagram user info☆34Updated 5 years ago
- The best DOS Tool Out There!☆21Updated 9 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- Phishing on Twitter☆254Updated 7 years ago
- Chat with hacker assistant☆194Updated 7 years ago
- Simple brute forcing in Python.☆105Updated last year
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
- Prints the IPs on your local network that're sending the most packets☆151Updated 4 years ago
- A sample node module built with Rust. Calculates the closest airport to a given latlon coordinate.☆18Updated 7 years ago
- Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆187Updated 4 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Terminator metasploit payload generator☆180Updated 7 years ago
- Unleash the slow loris☆82Updated 12 years ago
- Various Kali Scripts☆56Updated 8 years ago