wddadk / Phishing-campaigns
☆94Updated last year
Alternatives and similar repositories for Phishing-campaigns:
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 9 months ago
- 1C RAS Offensive Security Tool☆25Updated last year
- ☆57Updated 2 years ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆190Updated 5 months ago
- ☆131Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 2 years ago
- ☆39Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆107Updated 4 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- All-sources tool to search websites by favicons☆123Updated 5 months ago
- A repository with informtion related to Cloud Osint☆91Updated last month
- Shodan Dorks 2023☆232Updated 3 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- A good selection of Privacy & Infosec tools that will help you understand more about how to protect your online privacy and security.☆123Updated last month
- ☆50Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆159Updated 2 weeks ago
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆179Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆42Updated last week
- Tools and Resources for Physical Security Red Teaming☆31Updated last month
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated 3 months ago
- Ready to go Phishing Platform☆39Updated 6 months ago
- Find Email Spoofing Vulnerablity of domains☆94Updated 9 months ago
- Finding secrets in various (non-text) popular files.☆24Updated 3 months ago
- ☆62Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- ☆139Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year