lazyhacker 9 months ago

Top 10 Phishing Tools

Phishing is a type of cyber attack where the attacker, masquerading as a trustworthy entity, attempts to deceive individuals into divulging sensitive information such as usernames, passwords, credit card details, or other personal data. This is typically done through fraudulent emails, messages, or websites that mimic legitimate sources, luring victims to enter their confidential information unknowingly. The aim of phishing is to exploit this stolen data for malicious purposes, such as identity theft, financial fraud, or unauthorized access to sensitive accounts.

  1. Evilginx2:- https://github.com/kgretzky/evilginx2
  2. SEToolkit:- https://github.com/trustedsec/social-engineer-toolkit
  3. King-Phisher:- https://github.com/rsmusllp/king-phisher
  4. Gophish:- https://getgophish.com/
  5. Wifiphisher:-https://github.com/wifiphisher/wifiphisher
  6. socialfish:-https://github.com/UndeadSec/SocialFish
  7. black eye:-https://github.com/An0nUD4Y/blackeye
  8. shellfish:-https://github.com/AbirHasan2005/ShellPhish
  9. zphisher:-https://github.com/topics/zphisher
  10. AdvPhishing:-https://github.com/Ignitetch/AdvPhishing
0
617
API Basics: Understanding SOAP vs. REST, URLs

API Basics: Understanding SOAP vs. REST, URLs

defaultuser.png
X0NE
9 months ago
Curl Command Cheat Sheet for Penetration Testing

Curl Command Cheat Sheet for Penetration Testing

defaultuser.png
lazyhacker
9 months ago
A very comprehensive penetration testing memo: including tools, techniques and techniques [worth collecting]

A very comprehensive penetration testing memo: including tools, techni...

defaultuser.png
lazyhacker
8 months ago
Installing Kali Linux on Android without Root

Installing Kali Linux on Android without Root

defaultuser.png
Admin
3 months ago
Introduction to APIs: A Comprehensive Guide to Understanding Their Purpose and Applications

Introduction to APIs: A Comprehensive Guide to Understanding Their Pur...

defaultuser.png
X0NE
9 months ago