omergunal / PoT
Phishing on Twitter
☆252Updated 6 years ago
Alternatives and similar repositories for PoT:
Users that are interested in PoT are comparing it to the libraries listed below
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆436Updated 7 years ago
- ☆511Updated last year
- Advanced Hash Manipulation☆175Updated 5 years ago
- The Hacker's ToolBox☆183Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Social Engineering Tool☆189Updated 6 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 3 years ago
- Cloak can backdoor any python script with some tricks.☆487Updated 5 years ago
- Collection of social engineering payloads☆295Updated 7 years ago
- Git all your favorite tools in one click☆261Updated 2 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆341Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆328Updated 6 months ago
- Office for Mac Macro Payload Generator☆238Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering…☆335Updated 5 years ago
- information gathering via dorks☆381Updated 2 years ago
- A unified console to perform the "kill chain" stages of attacks.☆201Updated last year
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- Linux bash script automation for metasploit☆260Updated 5 years ago
- network reconnaissance toolkit☆421Updated 6 years ago
- Chat with hacker assistant☆193Updated 7 years ago
- Python framework for IT security tools☆263Updated 8 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆182Updated 5 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 6 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆339Updated 7 years ago
- HackBox is a powerful and comprehensive tool that combines a variety of techniques for web application and network security assessments, …☆394Updated last year
- myBFF - a Brute Force Framework☆139Updated last year
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year