nadmk / PHPhisherLinks
PHPhisher: An open source phishing platform 
☆10Updated 7 years ago
Alternatives and similar repositories for PHPhisher
Users that are interested in PHPhisher are comparing it to the libraries listed below
Sorting:
- 802.11 radiotap and MPDU parser☆14Updated 7 years ago
 - Forwards external public ports to internal ports without router access.☆138Updated 13 years ago
 - Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
 - The shards of code that will soon become the next GooDork version☆17Updated 12 years ago
 - Get Instagram user info☆34Updated 6 years ago
 - A robust JavaScript implementation of Bacon’s cipher, a.k.a. the Baconian cipher.☆24Updated 10 years ago
 - Chat with hacker assistant☆196Updated 7 years ago
 - ARP ping detector on local network☆15Updated 12 years ago
 - Wrapping up end-to-end code and provide in freedom custom API.☆34Updated 9 years ago
 - Various Kali Scripts☆59Updated 8 years ago
 - The best DOS Tool Out There!☆22Updated 9 years ago
 - CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
 - MCD's Black Jack is a password cracking tool for linux that cracks md5, sha1, sha256 and sha512 hashes. It uses the Dictionary bruteforci…☆20Updated 5 years ago
 - #PINNING is a browser extension (currently TamperMonkey script) to improve Pinterest's desktop browsing UX☆16Updated 2 months ago
 - Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 7 years ago
 - Terminator metasploit payload generator☆180Updated 7 years ago
 - Swiss army knife for (web) security specialists.☆12Updated 7 years ago
 - Some useful scripts for penetration testing☆45Updated 8 years ago
 - A password cracker for Portable PHP password hashes☆67Updated 5 years ago
 - JavaScript-compatible Unicode data. Arrays of code points, arrays of symbols, and regular expressions for Unicode v11.0.0’s categories, s…☆16Updated 3 weeks ago
 - The Hacker's ToolBox☆189Updated 8 years ago
 - Unleash the slow loris☆82Updated 12 years ago
 - Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆93Updated 9 years ago
 - Scrape google search results☆93Updated 7 years ago
 - Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆187Updated 4 years ago
 - An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
 - Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
 - Advanced Hash Manipulation☆176Updated 6 years ago
 - Show info about the author by facebook photo url☆39Updated 8 years ago
 - An experimental distributed JWT token cracker built using Node.js and ZeroMQ☆57Updated last year