A USB phishing evaluation platform
☆46Oct 15, 2015Updated 10 years ago
Alternatives and similar repositories for phishforall
Users that are interested in phishforall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email☆72Jul 10, 2018Updated 7 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆96Sep 14, 2016Updated 9 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Apr 25, 2017Updated 9 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆248Mar 11, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆70Oct 20, 2025Updated 6 months ago
- A tool to extract firmware from an O.MG Cable☆11Mar 24, 2021Updated 5 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Process Nanny. It's like daemontools or supervisord, but fun.☆14Jun 30, 2011Updated 14 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- ☆14Jan 25, 2024Updated 2 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- Minimal inline hooking for Windows x64 without trampoline — 2-byte infinite loop hook, cross-process support via NThread.☆25Aug 21, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- This is the latest KLCiS Voucher System embedded portal for Omada cloud/hardware controller. With this, the client can now check their pu…☆17Mar 6, 2025Updated last year
- M5StickC +CardKB HAT で、ポケコンっぽい何かを作りたい!☆11Nov 15, 2020Updated 5 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Feb 12, 2025Updated last year
- Tool For Frontal Camera Hack.☆62Nov 16, 2025Updated 5 months ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Arduino Uno template project for KiCad EDA☆16Feb 11, 2021Updated 5 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An Awesome List for getting started with web archiving☆19Dec 21, 2018Updated 7 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- ☆11Jan 30, 2025Updated last year
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year