Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Nitrokey / dongleauth
Forked from 2factorauth/twofactorauthList of sites with two factor auth support for OTP and U2F hardware dongles.
Flipper Application Catalog
Flipper Application Catalog
Collection of all ble devices for Android & IOS! 🔵🦷
Bluetooth Forward and Future Secrecy Attacks and Defenses (BLUFFS) [CVE 2023-24023]
The ultimate phishing tool with 40 websites available!
BLACKEYE v2.0 | New Phishing tool with localtunnel
Information gathering & website reconnaissance | https://phishstats.info/
📱 🐟 An app to remote control SocialFish.
An Android application that detects phishing in incoming texts and alerts the user through notification in real time. The user may also examine the legitimacy of any message by accessing it in the …
The most complete Phishing Tool, with 32 templates +1 customizable. Legal disclaimer by creators: Usage of SocialPhish for attacking targets without prior mutual consent is illegal. It's the end us…
SniperPhish - The Web-Email Spear Phishing Toolkit
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
steal victim images exact location device info and much more
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains and brands.
🔑 WiFi captive portal for ESP8266 for phishing WiFi passwords
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary…
Simple script that checks a domain for email protections