Plugins for the King Phisher open source phishing campaign toolkit.
☆84Feb 21, 2021Updated 5 years ago
Alternatives and similar repositories for king-phisher-plugins
Users that are interested in king-phisher-plugins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Templates for the King Phisher open source phishing campaign toolkit.☆176Sep 18, 2019Updated 6 years ago
- Phishing Campaign Toolkit☆2,529Jul 29, 2025Updated 8 months ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆13Nov 25, 2022Updated 3 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Bluetooth reverse shell.☆14Dec 16, 2020Updated 5 years ago
- Ruby on Rails Phishing Framework☆886Nov 7, 2023Updated 2 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Oct 10, 2019Updated 6 years ago
- Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests☆21Jul 19, 2021Updated 4 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- An npm package to defang and refang IoC☆13Sep 7, 2025Updated 6 months ago
- PHP Script demonstrating a smart honey pot.☆18Apr 19, 2014Updated 11 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆211Jun 14, 2024Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,412Jan 9, 2024Updated 2 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 7 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago