The most complete Phishing Tool, with 32 templates +1 customizable
☆67Aug 7, 2018Updated 7 years ago
Alternatives and similar repositories for SocialPhish
Users that are interested in SocialPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- Extended docker build tool.☆16Jun 12, 2023Updated 2 years ago
- ☆35Jul 18, 2025Updated 8 months ago
- Download an Entire Account's Instagram Posts, Saved Posts, Stories and Highlights with Python☆25Oct 12, 2024Updated last year
- PowerShell scripts for installing applications or updates via GPO.☆12Sep 24, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- The most complete Phishing Tool, with 32 templates +1 customizable☆612Jul 2, 2021Updated 4 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Run Python on the Flipper Zero☆16Mar 28, 2024Updated 2 years ago
- Android pin cracker☆14Mar 25, 2022Updated 4 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Onion Website Template☆10Oct 24, 2021Updated 4 years ago
- Canary is a Python3 bot designed for the McGill University Community Discord Server. The bot provides helper functions to users, as well …☆12Dec 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as …☆16Mar 22, 2026Updated last week
- Recover private keys from a (corrupted) wallet.dat (Reddcoin)☆11Dec 17, 2020Updated 5 years ago
- an open source ransomware-like file crypter kit☆13Apr 4, 2016Updated 9 years ago
- This is a sample project which helps to understand how booting from CD-ROM and flash disks works.☆16Dec 18, 2022Updated 3 years ago
- Example implementation of AccountAuthenticator.☆12Dec 14, 2015Updated 10 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- TRACE PHONE NUMBERS☆10Aug 21, 2021Updated 4 years ago
- using phonenumbers/geocoder to trace a phone location☆14Sep 8, 2021Updated 4 years ago
- Zoho Mail Tracker: An email tracking tool for Zoho Mail Email Client☆13Aug 28, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This an Digispark Ducky Program For BruteForce an Android or Iphone or any other app locks that should be on 4 Digit or 6 Digit and it al…☆18Sep 1, 2023Updated 2 years ago
- SoPI (Software Post Install) Software para descargar/instalar después de una instalación de Windows 7/10/11)☆12Mar 14, 2026Updated 2 weeks ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Simple Forensic Tool for Photos☆12Apr 10, 2023Updated 2 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆11Oct 11, 2020Updated 5 years ago
- Wraps a powershell script from kali linux to Flipper Zero BadUSB☆15Sep 27, 2025Updated 6 months ago
- Mac and hostname random changer☆43Oct 12, 2017Updated 8 years ago
- trace phone number easily with script By BlackFox☆41Jul 24, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆19Jan 2, 2021Updated 5 years ago
- Every device has a limit on the size of the L2CAP ping. If it gets an L2CAP ping packet, which is beyond the limit of the size, it will c…☆23Jan 25, 2026Updated 2 months ago
- Get metadata about any url☆29Jul 1, 2025Updated 8 months ago
- Rubber ducky like scripts for ATTiny85☆22Mar 19, 2025Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Get the carrier for a phone number and the location it is registered in☆10Dec 27, 2021Updated 4 years ago
- Flipper Zero Code-Grabber Firmware☆23May 28, 2023Updated 2 years ago