Plugins for the King Phisher open source phishing campaign toolkit.
☆84Feb 21, 2021Updated 5 years ago
Alternatives and similar repositories for king-phisher-plugins
Users that are interested in king-phisher-plugins are comparing it to the libraries listed below
Sorting:
- Templates for the King Phisher open source phishing campaign toolkit.☆176Sep 18, 2019Updated 6 years ago
- Phishing Campaign Toolkit☆2,512Jul 29, 2025Updated 7 months ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Ruby on Rails Phishing Framework☆882Nov 7, 2023Updated 2 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆12Nov 25, 2022Updated 3 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Apr 19, 2021Updated 4 years ago
- Metasploit Exploiting Tool For Linux☆21Sep 27, 2021Updated 4 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Priv8 Image Capturing through Network Based On Driftnet☆24May 29, 2018Updated 7 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Ruby script for spoofing SMTP emails.☆45Feb 16, 2023Updated 3 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,407Jan 9, 2024Updated 2 years ago
- Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests☆21Jul 19, 2021Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Oct 10, 2019Updated 6 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated 11 months ago