yasserjanah / IZanamiFramework
The Izanami Framework is a phishing attacks framework, that use ARP spoof attack and DNS spoofing attack to redirect all LAN devices HTTP requests to a specified address to perform a Powerful Phishing attack, IZanami inject beef-xss hook.js file into each requested HTML page , to target and exploit users's browsers.
☆14Updated last year
Alternatives and similar repositories for IZanamiFramework:
Users that are interested in IZanamiFramework are comparing it to the libraries listed below
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- FUD Android Payload and Listener☆19Updated 6 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- Tools for Pentesting that all hacker need....☆16Updated 2 years ago
- Python script attack all social media accounts☆20Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- It's easy to use android botnet work without port forwarding, vps and android studio☆10Updated 3 years ago
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- Automated Password Cracking Tool☆16Updated 4 years ago
- simple ss7 & imsi catcher & kraken☆18Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- XDROID is android all in one hack tools☆35Updated 2 weeks ago
- A very user friendly and advanced phishing toolkit made for hackers☆27Updated 3 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- Keylogger using pynput + mail sender☆51Updated 4 years ago
- Find usernames☆25Updated 4 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- Search engine for internal and external links within the website☆23Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Anubis 7.0☆25Updated 6 months ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year