🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS as …
Backdooring Claude Code via hooks in settings.json. Authorized use only!
Offensive & proactive tool designed to disrupt phishing attacks by flooding fake phishing websites' login portals with a deluge of fake user…
Phishing framework written in Python using Flask and Jinja2 templates. Supports 2FA capture (TOTP/HOTP) and has pre-built modules for Gmail,…
A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.
A Powerful Phishing Tool with 50+ phishing templates. For more about Dark-Phish tool please visit the website.
Build sneaky & malicious LNK files.
Official DedSec Project GitHub Repository
Real-time phishing & scam domain blocklist — 130k+ curated threats, 888K+ community, free API, multiple formats
Scam intelligence, phishing attribution, drainer mapping. Legal OSINT only. Public data. Real cases. For researchers and victims.
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim ope…
Imitate discord's old login page! I AM NOT RESPONSIBLE FOR ANY CONSEQUENCES. FOR SECURITY TESTING PURPOSES ONLY
HaGeZi DNS: Free, Non-Commercial EU Public DNS Servers
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Domain name permutation as a service
A multifunctional Telegram based Android RAT without port forwarding.
Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automate…
Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping
EchoPhish is a phishing tool created specifically for Instagram, designed to bypass two-factor authentication (2FA).
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Standalone man-in-the-middle attack framework that bypasses 2FA by proxying authentication sessions and capturing session cookies. Uses phis…
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and not…
This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically …