samyoyo / weemanLinks
HTTP Server for phishing in Python
☆275Updated 2 years ago
Alternatives and similar repositories for weeman
Users that are interested in weeman are comparing it to the libraries listed below
Sorting:
- Hakku Framework penetration testing☆351Updated 4 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Updated 7 years ago
- HTTP server for phishing in python☆634Updated 6 years ago
- A simple python script to scan and attack wireless networks.☆203Updated 8 years ago
- A Python Script to find admin panel of a site☆179Updated 3 years ago
- an easy pentesting tool.☆504Updated 3 years ago
- PowerFull Administration Tool For Linux☆190Updated 8 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only☆545Updated 2 years ago
- Detect evil urls that uses IDN Homograph Attack.☆205Updated 7 years ago
- Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).☆646Updated 3 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆434Updated 3 years ago
- Using Social Engineering To Obtain WiFi Passwords☆101Updated 7 years ago
- Tools for information gathering☆355Updated last year
- Python tool for phishing☆249Updated last year
- Multiplatform payload dropper☆280Updated 4 years ago
- ☆104Updated 6 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆440Updated 7 years ago
- Python wordlist generator☆176Updated 3 years ago
- Social Engineering Toolkit☆128Updated 4 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆137Updated 4 years ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆106Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆762Updated 5 years ago
- Bomb any SMS number with messages using existing E-Mail account.☆72Updated 5 years ago
- Inject malicious code into *.debs☆279Updated 3 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆387Updated 5 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated 2 years ago
- Espionaje y recopilación de Información☆101Updated 4 years ago
- Python Remote Access Trojan☆143Updated 5 years ago