Docker container for creating the phishing sites using Blackeye
☆174Oct 7, 2022Updated 3 years ago
Alternatives and similar repositories for docker-blackeye
Users that are interested in docker-blackeye are comparing it to the libraries listed below
Sorting:
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- This is the updated version of blackeye with ngrok☆60Oct 7, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- BlackEye Phishing Kit in Python w Serveo Subdomain Creation | Educational Purposes Only☆552Sep 4, 2023Updated 2 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- internet monitoring osint telegram bot for windows☆152Apr 9, 2023Updated 2 years ago
- Nitrokey's plugin for KeePass☆12Feb 4, 2019Updated 7 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Dec 8, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- ☆61Mar 16, 2018Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆51Jul 7, 2025Updated 8 months ago
- git clone https://github.com/thelinuxchoice/blackeye☆43Nov 17, 2020Updated 5 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- ☆16May 3, 2021Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Mar 13, 2026Updated last week
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- ☆14Dec 30, 2024Updated last year
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Aug 2, 2013Updated 12 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Dec 21, 2020Updated 5 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- ☆68Aug 16, 2021Updated 4 years ago