wddadk / Phishing-campaigns
☆94Updated last year
Alternatives and similar repositories for Phishing-campaigns:
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 8 months ago
- 1C RAS Offensive Security Tool☆25Updated last year
- ☆127Updated 3 years ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆188Updated 3 months ago
- ☆57Updated last year
- Red Teaming tools and techniques☆50Updated 2 years ago
- Check bitrix vulnerabilities☆71Updated last year
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆168Updated last month
- 「🧱」Test a list of payloads and see if you can bypass it☆56Updated 2 years ago
- A repository with informtion related to Cloud Osint☆87Updated 2 months ago
- All-sources tool to search websites by favicons☆119Updated 4 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆101Updated last year
- Some nuclei templates for pentest CMS Bitrix☆25Updated last month
- A Slack bot phishing framework for Red Teaming exercises☆165Updated 10 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Shodan Dorks 2023☆231Updated 2 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 3 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year
- ☆40Updated 2 years ago
- All in 1 phishing framework☆35Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated last month
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Find Email Spoofing Vulnerablity of domains☆94Updated 7 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆174Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆158Updated 9 months ago
- Ready to go Phishing Platform☆40Updated 5 months ago