wddadk / Phishing-campaignsLinks
☆103Updated last year
Alternatives and similar repositories for Phishing-campaigns
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- ☆56Updated 2 years ago
- ☆133Updated 4 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- Red Teaming tools and techniques☆55Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆99Updated last month
- PacketSpy☆157Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
- ☆40Updated 3 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 7 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- A repository with informtion related to Cloud Osint☆108Updated 8 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆197Updated 4 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated 6 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- ☆50Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Strumenti utili per la ricerca di WebCam e Wifi di pubblico accesso - Useful tools for searching for public access webcams and Wi-Fi netw…☆112Updated 11 months ago
- Tools and Resources for Physical Security Red Teaming☆45Updated 2 weeks ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 6 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆112Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- Tactics, Techniques, and Procedures☆27Updated 10 months ago