Professional Phishing Awareness & Cybersecurity Education Platform
☆24Oct 17, 2025Updated 5 months ago
Alternatives and similar repositories for Phisher
Users that are interested in Phisher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mine valuable information using advanced Google search queries known as Google Dorks.☆27Aug 11, 2025Updated 7 months ago
- Deep learning final year projects offer students the opportunity to explore the latest advancements in artificial intelligence and apply …☆28Mar 23, 2026Updated last week
- A stealthy Python dark web scraper using Tor. Crawl .onion sites anonymously, with retries, rate-limiting, and automatic Tor circuit rene…☆72Aug 5, 2025Updated 7 months ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆21Mar 20, 2026Updated last week
- 🛡️ ClickShield is a modern, user-friendly web application that helps users identify potentially malicious websites and phishing attempts…☆14Nov 8, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆76Jan 1, 2026Updated 2 months ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆10Mar 26, 2019Updated 7 years ago
- Cannahome source code and database☆12Feb 22, 2023Updated 3 years ago
- NAIJA OSINT INTEL is a comprehensive open-source intelligence gathering tool specifically designed for Nigerian cybersecurity professiona…☆19Aug 21, 2025Updated 7 months ago
- CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engi…☆38Mar 10, 2026Updated 2 weeks ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆40Feb 11, 2026Updated last month
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- x3CTF Challenges 2025☆16Jan 26, 2025Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- ☆80Feb 12, 2026Updated last month
- MetaHarvest - is designed to extract rich, structured metadata from any given list of websites. It taps into web page contents to retriev…☆29Sep 16, 2025Updated 6 months ago
- Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Inciden…☆33Jul 7, 2025Updated 8 months ago
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 8 months ago
- Basic tool for Information Gathering 🚀☆23Mar 26, 2024Updated 2 years ago
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆24Sep 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- DeepSearch is a powerful Python-based OSINT utility that leverages Google's advanced search operators to perform comprehensive digital fo…☆60Dec 24, 2025Updated 3 months ago
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆84Mar 18, 2026Updated last week
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆25Oct 1, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆52Jul 1, 2024Updated last year
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago
- A curated list of vibe coding assistants, IDEs, tools and references for learning how to efficently collaborate with AI to write code. Be…☆35Apr 5, 2025Updated 11 months ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago