yasserjanah / IZanamiFrameworkLinks
The Izanami Framework is a phishing attacks framework, that use ARP spoof attack and DNS spoofing attack to redirect all LAN devices HTTP requests to a specified address to perform a Powerful Phishing attack, IZanami inject beef-xss hook.js file into each requested HTML page , to target and exploit users's browsers.
☆14Updated 2 years ago
Alternatives and similar repositories for IZanamiFramework
Users that are interested in IZanamiFramework are comparing it to the libraries listed below
Sorting:
- Python script attack all social media accounts☆17Updated 2 years ago
- FUD Android Payload and Listener☆20Updated 7 years ago
- Keylogger using pynput + mail sender☆54Updated 5 years ago
- This is a simple tool for openbullet configs☆23Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆25Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆34Updated 5 years ago
- Black Webbrowser v2.0☆16Updated 2 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 3 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Updated 3 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 6 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 5 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆20Updated last year
- Its like airgeddon but better!☆59Updated last year
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Anonymous mail server for Termux☆13Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- emailosint is a tool for gathering email accounts informations (ip,hostname,country, etc...)☆23Updated 4 years ago
- Small social engineering tool written in python2☆20Updated 11 months ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 8 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Fully Undetectable telegram Rat dropper☆37Updated 4 years ago
- python script that hide phishing url like a pro "masking url technique"☆43Updated 4 years ago
- A Simple Script For SSH BruteForce☆37Updated 2 years ago