Phishing Toolkit
☆19Feb 20, 2018Updated 8 years ago
Alternatives and similar repositories for tacklebox
Users that are interested in tacklebox are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Ruby DKIM Parser☆20Sep 12, 2024Updated last year
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Ruby DMARC Parser☆25Jan 24, 2024Updated 2 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆34Jun 1, 2021Updated 4 years ago
- ☆84May 19, 2015Updated 10 years ago
- Phishing toolkit for red teams and pentesters.☆125Jun 1, 2018Updated 7 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆102Aug 29, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- An Android soft keyboard using Morse code.☆14Jun 22, 2013Updated 12 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- GraphQL Middleware for container interop☆13Jun 18, 2019Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Feb 1, 2019Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- work in progress ....☆10Mar 4, 2020Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago