redteamsecurity / PyPhishing
Phishing application to aid in sending emails more simply and allowing for more control over settings.
☆102Updated 7 years ago
Alternatives and similar repositories for PyPhishing:
Users that are interested in PyPhishing are comparing it to the libraries listed below
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- Useful pentesting scripts☆83Updated 2 months ago
- myBFF - a Brute Force Framework☆140Updated last month
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 7 years ago
- Additional modules for recon-ng☆104Updated 7 years ago
- Phishing Template Generation Made Easy☆164Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- ☆193Updated 6 years ago
- Collection of social engineering payloads☆297Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- An automated SMB relay exploitation script.☆153Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- ☆92Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- ☆86Updated 9 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆146Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Tool for breaking into web applications.☆91Updated 5 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Linux pentest tools☆87Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- ☆26Updated 8 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago