A USB phishing evaluation platform
☆46Oct 15, 2015Updated 10 years ago
Alternatives and similar repositories for phishforall
Users that are interested in phishforall are comparing it to the libraries listed below
Sorting:
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Code for Malware which spreads by injecting pendrive and sends IP address and MAC ID to Attackers Email☆72Jul 10, 2018Updated 7 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆96Sep 14, 2016Updated 9 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆101Apr 25, 2017Updated 8 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- #Simple program to track someone by send malicious link☆14May 17, 2020Updated 5 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Dec 13, 2023Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- Simple Python Script to bypass Facebook profile picture guard and get the profile picture at full resolution☆13Oct 23, 2019Updated 6 years ago
- Penetration testing automation toolkit☆22Jul 4, 2015Updated 10 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Hacking every email by use script Mr.Robot☆57Sep 1, 2018Updated 7 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Whole house water leak detection and water shutoff system. Requires a supervisory computer for full functionality. Communications is via…☆10Mar 16, 2025Updated 11 months ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- AI Powered Terminal Based Ethical Hacking Assistant☆89Feb 3, 2025Updated last year
- Python script wrote to automate the process of generating various reverse shells.☆199Jan 3, 2026Updated 2 months ago
- Scraper for Facebook's Archive of Ads with Political Content☆37Sep 8, 2018Updated 7 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- open ports to the Internet easily and for free through special hostings☆30Nov 23, 2024Updated last year
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆17Feb 18, 2026Updated 2 weeks ago
- Block excessive crawlers, bots and spiders traffic on your web site 👾☆34Jul 29, 2023Updated 2 years ago
- Knowledge Manager Agent for Claude Code - Extract and organize content from web, PDF, social media to Obsidian/Notion☆30Updated this week
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year