wddadk / Phishing-campaignsLinks
☆102Updated last year
Alternatives and similar repositories for Phishing-campaigns
Users that are interested in Phishing-campaigns are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- ☆134Updated 4 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- ☆57Updated 2 years ago
- ProxyChecker Made in NodeJS☆38Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- 1C RAS Offensive Security Tool☆27Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 4 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆192Updated last month
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Fetching passwords from the chrome browser database☆92Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- Kali noise reduction tool☆318Updated 3 months ago
- ☆40Updated 2 years ago
- ☆25Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Red Teaming tools and techniques☆54Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- ☆50Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆77Updated last month
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆53Updated last month
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 3 months ago
- A repository with informtion related to Cloud Osint☆109Updated 5 months ago