nsgodshall / Hatch
Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in the Null Byte tutorial for Hatch.
☆154Updated 2 years ago
Alternatives and similar repositories for Hatch:
Users that are interested in Hatch are comparing it to the libraries listed below
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆159Updated 11 months ago
- PowerFull Administration Tool For Linux☆147Updated 7 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- PhishX - The Complete Spear Phishing Tool☆109Updated 6 years ago
- Community-built scenarios for Wifiphisher☆354Updated 4 years ago
- Git all your favorite tools in one click☆265Updated 3 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆51Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆427Updated 3 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆62Updated 4 years ago
- Control remote computers using discord bot and python 3.☆176Updated 3 years ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆104Updated 3 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆89Updated 4 years ago
- An Open Source Multi Site Automated Social Media Phishing Framework☆151Updated 5 years ago
- A Python Script to find admin panel of a site☆175Updated 2 years ago
- Multiplatform payload dropper☆273Updated 3 years ago
- PROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITES SCENARIOS☆278Updated 4 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated last year
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆156Updated 3 years ago
- Using Social Engineering To Obtain WiFi Passwords☆100Updated 7 years ago
- Information Gathering Tool☆54Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆273Updated 7 years ago
- Inject malicious code into *.debs☆274Updated 3 years ago
- Ultimate Recon Software for Information Gathering☆97Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- ☆35Updated 6 years ago
- 🛅 Passwords using personal information☆82Updated 4 years ago
- Python tool for phishing☆227Updated last year
- Simple script masks the phishing link under the normal URL☆82Updated 4 years ago
- Social Engineering Toolkit☆112Updated 3 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆133Updated 4 years ago