ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, an…
SniperPhish - The Web-Email Spear Phishing Toolkit
Open-source penetration testing framework designed for social engineering attacks. Features phishing attacks, credential harvesting, spear-p…
A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools h…
Phishing Tool & Information Collector
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find…
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Custom SpamAssassin rules I and others have made and contributed with - To mitigate spam mails and phishing mails now also with cool Phishta…
Tool designed to allow quick and effective phishing exercises. Automates target gathering, email generation, website cloning, and credential…
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
StalkPhish-OSS - The Phishing kits stalker, harvesting phishing kits for investigations.
A collection of static files maintained by the Sublime team, primarily used for phishing defense.
Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}
Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control,…
Sublime rules for email attack detection, prevention, and threat hunting.
SVG Analysis and generation tools for commonly seen SVG attachment phishing
Your target's phone's front and back cameras📸 can be accessed by sending a link🔗.
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
ThePhish: an automated phishing email analysis tool
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, …
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…
### THIS TOOL DOESN'T PROMOTE ANT TYPE OF ILLEGAL ACTIVITY ITS MADE ONLY FOR EDUCATIONAL PURPOSE AND TESTING.I DO NOT TAKE ANY RESPONSABILIT…
People tracker on the Internet: OSINT analysis and research tool by Jose Pino