☆17Jul 18, 2020Updated 5 years ago
Alternatives and similar repositories for UrlPhish
Users that are interested in UrlPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 7, 2021Updated 4 years ago
- python3☆73Dec 18, 2020Updated 5 years ago
- python3 php☆117Oct 30, 2022Updated 3 years ago
- Track Location From IP.☆11Dec 25, 2020Updated 5 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- LinkedIn Auto Connect Tool☆12Jan 3, 2021Updated 5 years ago
- An animated loader graphic module.☆16May 27, 2024Updated last year
- ☆10May 15, 2020Updated 5 years ago
- Telegram Group Scraper Tool. Fetch All Information About Group Members☆18Jan 23, 2022Updated 4 years ago
- Spam call (panggilan) untuk mengerjai teman☆22Jul 18, 2022Updated 3 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Apr 14, 2026Updated 3 weeks ago
- Program to detect and remove the root level SSL certificates installed by NCALayer program☆14Jul 19, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Android based vote verification application for Estonian I-voting system☆20Oct 3, 2025Updated 7 months ago
- Attack on a local network using an ARP vulnerability☆11Jan 12, 2022Updated 4 years ago
- PC Park observer☆17Apr 14, 2024Updated 2 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- Spam SmS [ Free ]☆32Jul 2, 2019Updated 6 years ago
- A simple script that will run in MOTD on a linux server and will tell you the attack statistics☆33May 6, 2021Updated 5 years ago
- Simple python file that sends victim ip,host name,location etc.., to your mail address☆15Jan 8, 2023Updated 3 years ago
- API Security University & PortSwigger Academy Study Notes☆24Nov 13, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17Jul 25, 2018Updated 7 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Recieve raw network trafic dump in pcap-format and parse it to squid-proxy log. Then generate report for lightsquid and shows it in Web U…☆89Apr 12, 2023Updated 3 years ago
- HiddenEye is a pishing website, II am going to show how you can install HiddenEye in termux in android☆39Jan 7, 2024Updated 2 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆36Mar 15, 2022Updated 4 years ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆40Sep 12, 2024Updated last year
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- ☆51Mar 22, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My Payload Collection (XSS,SQL ...)☆14Jul 17, 2018Updated 7 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Oct 21, 2019Updated 6 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- Analysis and exploitation of an use-after-free in ProFTPd☆14Jun 21, 2023Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago