ring0lab / catphishLinks
CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.
☆628Updated 7 years ago
Alternatives and similar repositories for catphish
Users that are interested in catphish are comparing it to the libraries listed below
Sorting:
- SpeedPhishing Framework☆448Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Updated 8 years ago
- ☆524Updated 2 years ago
- The Credential Mapper☆449Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Updated 8 years ago
- Email recon made fast and easy, with a framework to build on☆952Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- ☆613Updated last year
- A web front-end for password cracking and analytics☆621Updated 4 years ago
- information gathering via dorks☆400Updated 3 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆650Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Updated 8 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆635Updated last month
- Modern tactical exploitation toolkit.☆856Updated 2 months ago
- network reconnaissance toolkit☆433Updated 7 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆455Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,321Updated 4 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago
- powerful auto-backdooring utility☆748Updated 8 years ago
- Specify targets and run sets of tools against them☆386Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆470Updated 6 years ago
- Ruby on Rails Phishing Framework☆878Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆338Updated last year
- wide range mass audit toolkit☆1,033Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Collection of social engineering payloads☆299Updated 8 years ago