Goldphish phishing server with ngrok tunneling support.
☆19Sep 7, 2018Updated 7 years ago
Alternatives and similar repositories for goldphish
Users that are interested in goldphish are comparing it to the libraries listed below
Sorting:
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Collection of popular phishing websites.☆30Aug 24, 2022Updated 3 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Visa cvv tool for obtaining promotional visas and running the performance and will give you 20 with all its information.☆10Jun 25, 2021Updated 4 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- This bot allows you to automate the download process from a page where links to download files are periodically added☆10Dec 16, 2019Updated 6 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 9 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- monerobux modules for sopel irc bot☆11Aug 24, 2021Updated 4 years ago
- A Django-based Foreign Exchange data toolkit. Part of the Valuehorizon application ecosystem.☆10Jul 6, 2022Updated 3 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- ☆10Oct 6, 2020Updated 5 years ago
- A blind XXE injection callback handler. Uses HTTP and FTP to extract information. Originally written in Ruby by ONsec-Lab.☆10Mar 18, 2019Updated 6 years ago
- 基于http代理的web漏洞扫描器的实现☆10Jul 5, 2015Updated 10 years ago
- ☆13Mar 3, 2026Updated last week
- ☆13Sep 11, 2014Updated 11 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 10 months ago
- Java ClassLoader for Nashorn with Maven support. Allows to define any Java dependencies directly in scripts.☆13Oct 22, 2019Updated 6 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- distributed nmap using Celery☆11Mar 17, 2017Updated 8 years ago
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- 蜜罐捕获的数据☆11May 16, 2016Updated 9 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Encode an image to sound (WAV file) and view it as a spectrogram. Optimized Python 3 version.☆11Jan 25, 2023Updated 3 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- RDF discovery and publication platform☆10Mar 2, 2026Updated last week
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- ☆10Feb 18, 2016Updated 10 years ago
- ☆12Apr 5, 2025Updated 11 months ago