rsmusllp / king-phisher-pluginsView external linksLinks
Plugins for the King Phisher open source phishing campaign toolkit.
☆84Feb 21, 2021Updated 4 years ago
Alternatives and similar repositories for king-phisher-plugins
Users that are interested in king-phisher-plugins are comparing it to the libraries listed below
Sorting:
- Templates for the King Phisher open source phishing campaign toolkit.☆176Sep 18, 2019Updated 6 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Ruby on Rails Phishing Framework☆880Nov 7, 2023Updated 2 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆126Jun 1, 2018Updated 7 years ago
- Who We Are☆21Sep 6, 2024Updated last year
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆12Nov 25, 2022Updated 3 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Priv8 Image Capturing through Network Based On Driftnet☆24May 29, 2018Updated 7 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Ruby script for spoofing SMTP emails.☆44Feb 16, 2023Updated 2 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Exploit the vulnerability to execute the calculator☆68Jan 11, 2018Updated 8 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,405Jan 9, 2024Updated 2 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆208Jun 14, 2024Updated last year