wddadk / Phishing-campaignsLinks
☆100Updated last year
Alternatives and similar repositories for Phishing-campaigns
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆193Updated 2 months ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 8 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 5 months ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- ☆134Updated 4 years ago
- ☆50Updated 2 years ago
- Kali noise reduction tool☆318Updated 4 months ago
- ☆57Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ☆41Updated 2 years ago
- Fetching passwords from the chrome browser database☆92Updated last year
- ☆65Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 4 months ago
- PacketSpy☆156Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- A repository with informtion related to Cloud Osint☆110Updated 6 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆53Updated 3 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆35Updated 2 years ago
- Cisco IOS Security Inspector☆37Updated last month
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆78Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago