wddadk / Phishing-campaignsLinks
☆106Updated 2 years ago
Alternatives and similar repositories for Phishing-campaigns
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- ☆136Updated 4 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Shodan Dorks 2023☆244Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆197Updated 6 months ago
- ☆54Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- Fetching passwords from the chrome browser database☆90Updated 2 years ago
- ☆49Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
- ☆65Updated last year
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆192Updated 2 years ago
- PacketSpy☆157Updated last year
- Automate Scoping, OSINT and Recon assessments.☆109Updated 2 weeks ago
- ☆146Updated 7 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆56Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆13Updated 2 months ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- Useful collection of scapy-scripts and more☆32Updated last year
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago