Automatically exported from code.google.com/p/ghost-phisher
☆391May 4, 2020Updated 5 years ago
Alternatives and similar repositories for ghost-phisher
Users that are interested in ghost-phisher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatically exported from code.google.com/p/hexorbase☆75Sep 7, 2017Updated 8 years ago
- Hijack services that relies on QR Code Authentication.☆275Dec 20, 2023Updated 2 years ago
- Phishing Campaign Toolkit☆2,528Jul 29, 2025Updated 8 months ago
- Ruby on Rails Phishing Framework☆889Nov 7, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/fern-wifi-cracker☆1,534Updated this week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,218Feb 6, 2022Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆719Sep 10, 2024Updated last year
- Phishing Tool & Information Collector☆4,711Oct 29, 2024Updated last year
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- SQL Injection Exploitation Tool☆813Jan 4, 2019Updated 7 years ago
- While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch o…☆18Oct 30, 2014Updated 11 years ago
- A Phishing Dropper designed to Pentest.☆274May 15, 2017Updated 8 years ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,124Apr 5, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,326Jan 23, 2018Updated 8 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆381Apr 13, 2017Updated 9 years ago
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆100Aug 29, 2017Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 11 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 5 years ago
- An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.☆453Jan 31, 2018Updated 8 years ago
- Network Attack Tool☆1,497May 1, 2023Updated 2 years ago
- Grab target's webcam shots by link☆1,263Jun 18, 2024Updated last year
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,179Mar 23, 2023Updated 3 years ago
- A facebook profile and reconnaissance system☆57Sep 21, 2014Updated 11 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago