A phishing tool to set a soft-AP on raspberryPi, filter the Http request and DNS query from the client and redirect the connection to a fake login website.
☆17Mar 4, 2018Updated 8 years ago
Alternatives and similar repositories for phishingPi
Users that are interested in phishingPi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- A certificate generator/manager for the WiFi Pineapple NANO and TETRA☆12Jul 18, 2020Updated 5 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Source IP spoofing for anonymization over UDP☆25Jan 9, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- ☆12May 18, 2015Updated 10 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Updated Malware Crawler to populate repositories☆10Jul 6, 2015Updated 10 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- ☆12Sep 4, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PredictionIO Recommendation Engine Template (Scala-based parallelized engine)☆14Jul 18, 2019Updated 6 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 8 months ago
- ☆11Jun 17, 2015Updated 10 years ago
- GB2260 code to postcode☆11Dec 24, 2015Updated 10 years ago
- Send an issue to propose a talk☆17Jul 12, 2019Updated 6 years ago
- a Netfilter powered UDP proxy☆13Dec 2, 2015Updated 10 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Script to tether your turtle to your laptop so that your turtle gets internet over your laptops connection instead of your laptop getting…☆14Aug 22, 2015Updated 10 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Simple HTTP server for eventmachine☆29Aug 28, 2017Updated 8 years ago
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- Código Arduino y JAVA para establecer una comunicación entre la placa y JAVA por puerto serial.☆15Sep 11, 2013Updated 12 years ago
- DEPRECATED☆16Aug 22, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- https://pinkdraconian.gitbook.io/methodology/☆13Aug 24, 2021Updated 4 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Jan 6, 2019Updated 7 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- CTF Tools☆12Nov 10, 2019Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago