PHP Phishing Framework
☆28Dec 28, 2013Updated 12 years ago
Alternatives and similar repositories for phishpoll
Users that are interested in phishpoll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 11 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 5 months ago
- ☆25Jan 18, 2015Updated 11 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- ☆10May 30, 2015Updated 10 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- Python script to test proxies☆15Jan 25, 2015Updated 11 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 11 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14May 2, 2020Updated 6 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Phishing Scenarios Used for Phishing Frenzy☆207Oct 30, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- InfoPath Phishing Repo Resource☆67Oct 26, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 13 years ago
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- ArchAssault PKGBUILDs☆45Aug 15, 2015Updated 10 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 4 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- Python Powered Repository☆15Jan 22, 2020Updated 6 years ago
- This repo contains code for the parser to extract data from .tm7 and .tb7 files. The project can by consumed as a NuGet package that pars…☆16Jun 15, 2023Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago