Automatically exported from code.google.com/p/ghost-phisher
☆388May 4, 2020Updated 5 years ago
Alternatives and similar repositories for ghost-phisher
Users that are interested in ghost-phisher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically exported from code.google.com/p/hexorbase☆75Sep 7, 2017Updated 8 years ago
- Hijack services that relies on QR Code Authentication.☆271Dec 20, 2023Updated 2 years ago
- Phishing Campaign Toolkit☆2,522Jul 29, 2025Updated 7 months ago
- Ruby on Rails Phishing Framework☆885Nov 7, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/fern-wifi-cracker☆1,519Sep 18, 2024Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,216Feb 6, 2022Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆710Sep 10, 2024Updated last year
- Phishing Tool & Information Collector☆4,692Oct 29, 2024Updated last year
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- SQL Injection Exploitation Tool☆813Jan 4, 2019Updated 7 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,113Apr 5, 2019Updated 6 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,323Jan 23, 2018Updated 8 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆380Apr 13, 2017Updated 8 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆102Aug 29, 2017Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 10 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆450Jan 31, 2018Updated 8 years ago
- Network Attack Tool☆1,497May 1, 2023Updated 2 years ago
- Grab target's webcam shots by link☆1,255Jun 18, 2024Updated last year
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- A facebook profile and reconnaissance system☆57Sep 21, 2014Updated 11 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago