pompa
Phishing toolkit
A fully featured spear-phishing toolkit web frontend.
Fully-featured spear-phishing toolkit - web front-end
49 stars
5 watching
12 forks
Language: JavaScript
last commit: 11 months ago Related projects:
Repository | Description | Stars |
---|---|---|
octoberfest7/teamsphisher | A tool designed to send phishing messages and attachments to Microsoft Teams users | 1,031 |
omergunal/pot | Automated phishing attack simulation tool | 251 |
optiv/microsoft365_devicephish | A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 92 |
timwhitez/doge-xss-phishing | A tool designed to automate cross-site scripting (XSS) phishing attacks using PHP and JavaScript. | 269 |
gemgeorge/sniperphish | A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. | 540 |
mkottman/luacrypto | A Lua-based implementation of OpenSSL features for encryption and decryption | 100 |
d3ckx1/ola | A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience | 626 |
ustayready/credsniper | A phishing framework that captures 2FA tokens and provides secure access to credentials | 1,332 |
t4d/phishingkithunter | A tool to identify phishing kits by analyzing referer URLs from legitimate websites' logs. | 225 |
mdsecactivebreach/o365-attack-toolkit | A toolkit for simulating phishing attacks on Office 365 accounts | 1,037 |
fkasler/phishmonger | A tool for crafting and testing phishing emails with granular control over SMTP and mail headers. | 159 |
1n3/intruderpayloads | A collection of tools and methodologies for simulating web application attacks | 3,681 |
logrhythm-labs/pie | A framework that detects and responds to phishing attacks by analyzing email contents, attachments, and links. | 180 |
s0md3v/striker | An offensive information and vulnerability scanner that identifies potential security issues in web applications | 2,234 |
p0cl4bs/wifipumpkin3 | A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 1,982 |