Multi-Tooled Phishing Framework. TigerShark intergrates some of the best (in my opinion), phishing tools and frameworks of various languages in order to suit whatever your deployment needs may be.
☆13Jun 19, 2020Updated 5 years ago
Alternatives and similar repositories for TigerShark
Users that are interested in TigerShark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android Application For Termux User ( India )☆12Apr 9, 2026Updated last week
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- First install { Termux } from Playstore. After opening Follow below commands One by one pkg install git python php curl openssh g…☆11Feb 15, 2021Updated 5 years ago
- Verify email address if it really exists or not☆14Nov 23, 2010Updated 15 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆21Feb 23, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- Setup HiddenEye Inside Of Termux☆10Jun 9, 2019Updated 6 years ago
- ebook version of Metasploit Unleashed book - http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Secu…☆25Jan 2, 2011Updated 15 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆15May 2, 2022Updated 3 years ago
- ☆24Sep 25, 2019Updated 6 years ago
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆12Jan 1, 2021Updated 5 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- PayPal Valid Email Checker☆13May 26, 2017Updated 8 years ago
- Lambda enc☆10May 29, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Image Tampering Detection WebApp☆12Jun 12, 2024Updated last year
- AUR Driver with monitor mode and frame injection for the trl8814au wifi chip☆10Nov 21, 2019Updated 6 years ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- ☆14Dec 17, 2019Updated 6 years ago
- New Dark FB☆15Sep 16, 2019Updated 6 years ago
- RTL8814AU drivers with monitor mode, frame injection and AP+Jammer☆14Apr 10, 2020Updated 6 years ago
- Bilgisayarınıza yapılan ARP Spoofing saldırılarını tespit eden ARP Spoof Detector Scripti.☆13May 7, 2021Updated 4 years ago
- EmailVuln☆15Feb 4, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Check For Valid Emails in Bulk!☆13Nov 17, 2020Updated 5 years ago
- An email spam tool (Gmail and Yahoo)☆17Dec 29, 2018Updated 7 years ago
- Read Cyberpunk 2077 hacking minigame details with a phone camera online. OpenCV magic in your browser.☆17Jun 20, 2022Updated 3 years ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- SL Cyber Warriors' Database to Join Cyber Acedamy Group.☆12Oct 6, 2021Updated 4 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆21Aug 22, 2020Updated 5 years ago
- EvilDroid+TheFatRat☆15Oct 18, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- This program spams the target email address by sending any number of mail.☆16Aug 4, 2020Updated 5 years ago
- Hola Tokens [ERC-20]☆12Feb 11, 2021Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Python script to generate Apple Client Secret Key with a specified lifespan (default = 6months)☆17Apr 4, 2023Updated 3 years ago
- ☆13Jun 10, 2022Updated 3 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago