rsmusllp / king-phisher
Phishing Campaign Toolkit
☆2,308Updated 5 months ago
Alternatives and similar repositories for king-phisher:
Users that are interested in king-phisher are comparing it to the libraries listed below
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,344Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,332Updated last year
- Find exploits in local and online databases instantly☆1,674Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,038Updated last year
- Automatically brute force all services running on a target.☆2,004Updated 4 months ago
- Phishing Tool & Information Collector☆4,198Updated 2 months ago
- Reconnaissance Swiss Army Knife☆1,842Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,696Updated 2 months ago
- Advanced dork Search & Mass Exploit Scanner☆1,446Updated 5 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,474Updated this week
- Official Black Hat Arsenal Security Tools Repository☆3,961Updated 4 months ago
- MSFvenom Payload Creator (MSFPC)☆1,237Updated 3 years ago
- Undetectable Windows Payload Generation☆1,567Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,771Updated 11 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,231Updated 3 months ago
- Efficient and advanced man in the middle framework☆2,059Updated last year
- Ruby on Rails Phishing Framework☆814Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,062Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,399Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,243Updated last year
- Network Attack Tool☆1,448Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,595Updated last month
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,299Updated 3 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,827Updated 3 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,204Updated 3 months ago
- Attack Surface Management Platform☆8,313Updated 2 weeks ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,826Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,069Updated this week
- Network Infrastructure Penetration Testing Tool☆1,624Updated 3 years ago