Showing 44 open source projects for "phishing%20tool"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
    Learn More
  • 1
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    Seeker is an open source project that demonstrates how to obtain precise location information from devices using social engineering and web-based techniques. The tool sets up a phishing page that asks for location permissions, allowing GPS and other device data to be shared if the user consents. It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    SimpleLogin

    SimpleLogin

    The SimpleLogin back-end

    With email aliases, you can be anonymous online and protect your inbox against spams and phishing. Open-source. Made and hosted in Europe. Receive and send emails anonymously. Next time a website asks for your email address, give an alias instead of your real email. Emails sent to an alias are instantly forwarded to your inbox without the sender knowing anything. Just hit "Reply" if you want to reply to a forwarded email: the reply is sent from your alias and your real email stays hidden. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 3
    Web-Check

    Web-Check

    All-in-one OSINT tool for analysing any website

    Comprehensive, on-demand open source intelligence for any website. Get an insight into the inner-workings of a given website: uncover potential attack vectors, analyse server architecture, view security configurations, and learn what technologies a site is using. Currently the dashboard will show: IP info, SSL chain, DNS records, cookies, headers, domain info, search crawl rules, page map, server location, redirect ledger, open ports, traceroute, DNS security extensions, site performance,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    This project explores USB device emulation attacks—commonly called BadUSB—by demonstrating how commodity USB hardware can impersonate keyboards, network adapters, or storage devices to perform scripted actions on a host. It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for...
    Downloads: 7 This Week
    Last Update:
    See Project
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 5
    Modlishka

    Modlishka

    Powerful and flexible HTTP reverse proxy

    Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy of multi-domain destination traffic, both TLS and non-TLS, over a single domain, without the requirement of installing any additional certificate on the client. What exactly does this mean? In short, it simply has a lot of potential, that can be used in many use case scenarios. Modlishka was written as...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    iDeal-DNS-Switcher

    iDeal-DNS-Switcher

    One click DNS switcher.

    ...These providers have been selected for their robust security and privacy practices. They protect your browsing activity from prying eyes. They help to protect your computer against a wide range of threats such as malware, phishing, spyware and botnets. And save your children from undesirable contents...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7

    url-checker-php-sdk

    Official PHP SDK for the EmailVeritas URL Checker API

    ...Ideal for CRMs, contact forms, and security dashboards. Features: • Real-time phishing detection • URL Lookup and URL Scan endpoints • WHOIS, redirect, and metadata analysis • Native PHP (cURL) implementation • Composer integration • MIT License Homepage: https://www.emailveritas.com/url-checker Repository: https://github.com/Email-Veritas/url-checker-php-sdk
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    DNS Filters

    This repository houses a curated collection of DNS filter lists

    This repository houses a curated collection of DNS filter lists, accumulated over several years. These lists are designed to enhance network security and efficiency by blocking unwanted or harmful domains.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    PimersusOS

    PimersusOS

    PimersusOS: Lightweight, fast and flexible Linux based on Debian 13.

    ...Based on Debian 13 Stable (MX Linux), it offers a fluid and controlled system, perfect for modest machines and testing the browser on limited hardware. Pimersus Browser is based on WebKit, the Safari engine, and incorporates advanced privacy and security protections, including ad blocking, phishing protection, and web tracking protection. This ensures a safe and fast experience, similar to browsing on iOS devices. Keeping the system updated is easy with `sudo apt update` and `sudo apt upgrade`. The ISO (~4.5 GB) serves as a reference and testing environment for the browser. Password: ams ⚠️ It is recommended to watch the entire video before installing. ...
    Leader badge
    Downloads: 185 This Week
    Last Update:
    See Project
  • Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution Icon
    Reach Your Audience with Rise Vision, the #1 Cloud Digital Signage Software Solution

    K-12 Schools, Higher Education, Businesses, Restaurants

    Rise Vision is the #1 digital signage company, offering easy-to-use cloud digital signage software compatible with any player across multiple screens. Forget about static displays. Save time and boost sales with 500+ customizable content templates for your screens. If you ever need help, get free training and exceptionally fast support.
    Learn More
  • 10
    MrFish

    MrFish

    A anti-phishing Python script with headers and proxies!

    MrFish is a powerful tool designed to automate the creation of fake account submissions for phishing tests and vulnerability assessments. With the ability to generate random usernames, passwords, and even credit card data, it simulates real user behavior to help test the security of online forms. Featuring customizable settings for proxy support, user inputs (email or username), and multiple threads for speed, MrFish provides an efficient way to stress-test web servers and form-handling systems. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    StrongKey FIDO Server (SKFS)

    StrongKey FIDO Server (SKFS)

    FIDO® Certified StrongKey FIDO Server (SKFS)

    An open source implementation of the FIDO2 protocol to support passwordless strong authentication using public-key cryptography. Supports registration, authentication (all platforms), and transaction authorization (for native Android apps).
    Downloads: 38 This Week
    Last Update:
    See Project
  • 12
    iDeal OS

    iDeal OS

    The alternative OS, secure by design.

    Welcome to iDeal OS. iDeal OS is a computer operating system, a custom "respin" based on the the powerful distributions of MX Linux and Debian, with the best privacy and security settings enabled by default. The main goals of iDeal OS are privacy and security: you can surf, shop, trade and bank online with complete peace of mind, without annoying ads, tracking, logging, bugs, viruses or unwanted disclosure of personal information. iDeal OS is available in two different editions: -...
    Leader badge
    Downloads: 167 This Week
    Last Update:
    See Project
  • 13
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7Builder is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource-intensive, extremely powerful and highly secure. pH7Builder is included with over 42 native modules and is based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7Builder Social Dating Script...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 14
    Zphisher

    Zphisher

    An automated phishing tool with 30+ templates

    Zphisher is an advanced open-source phishing tool for educational and penetration testing purposes. It provides a simple interface for launching phishing attacks by cloning login pages of popular websites. Built in Bash, Zphisher automates server deployment using tunneling services like Ngrok, Localhost.run, and others. It is intended for ethical hacking and security research to demonstrate how phishing attacks work and how to defend against them.
    Downloads: 119 This Week
    Last Update:
    See Project
  • 15
    Gophish

    Gophish

    Open-Source Phishing Framework

    Gophish is a powerful open-source phishing toolkit that makes it easy to test an organization’s exposure to phishing. Designed for businesses and penetration testers, Gophish lets you quickly and easily set up and launch phishing campaigns, track results and set up security awareness training. Gophish works on most platforms, including Windows, Mac OS X and Linux.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 16
    nitrokey-fido2-firmware

    nitrokey-fido2-firmware

    FIDO2 USB token optimized for security, extensibility, and style

    Nitrokey FIDO2 is an open source security key that supports FIDO2 and U2F standards for strong two-factor authentication and password-less login. It protects you against phishing and other online attacks. It's based on Solokey. This repository contains the firmware, including implementations of FIDO2 and U2F (CTAP2 and CTAP) over USB and NFC. The main implementation is for STM32L432, but it is easily portable. For development no hardware is needed, it also runs as a standalone application for Windows, Linux, and Mac OSX. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    MaskPhish

    MaskPhish

    Introducing "URL Making Technology" to the world

    MaskPhish is not any Phishing tool. It's just a proof of concept of "URL Making Technology". It is a simple Bash Script to hide phishing URLs under a normal-looking URL (google.com or facebook.com). It can be integrated into Phishing tools (with proper credits) to look the URL legit. Hiding phishing links in normal-looking trust-able links is a bigger part of social engineering.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18

    maskphish

    MaskPhish: First ever URL masking tool for Phishing

    MaskPhish can hide any URL to another URL. We can make https://ngrok.io/4GTJ78C [Example Link] to https://google.com/live-football@is.gd/6hts4 [Example Link] For more Cybersecurity information visit https://www.kalilinux.in
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    HackingTool by Z4nzu is a large collection (“all-in-one”) of tools and scripts for penetration testing / hacking / OSINT etc. It bundles many utilities (port scanners, payload injectors, web attack tools, phishing tools, wireless attack tools, reverse engineering, etc.) into a menu interface. Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering categories: reconnaissance, payload creation, wireless attacks, reverse engineering, exploit frameworks, etc. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20
    King Phisher

    King Phisher

    Phishing Campaign Toolkit

    King Phisher is an open source tool that can simulate real world phishing attacks. It has an easy-to-use, flexible architecture that allows for full control over both emails and server content. It is useful for running awareness campaigns and training, and can only be used for legal applications when the explicit permission of the targeted organization has been obtained.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 21
    WebSploit Framework

    WebSploit Framework

    WebSploit is a high level MITM Framework

    WebSploit Advanced MITM Framework [+]Autopwn - Used From Metasploit For Scan and Exploit Target Service [+]wmap - Scan,Crawler Target Used From Metasploit wmap plugin [+]format infector - inject reverse & bind payload into file format [+]phpmyadmin Scanner [+]CloudFlare resolver [+]LFI Bypasser [+]Apache Users Scanner [+]Dir Bruter [+]admin finder [+]MLITM Attack - Man Left In The Middle, XSS Phishing Attacks [+]MITM - Man In The Middle Attack [+]Java Applet Attack [+]MFOD Attack Vector [+]ARP Dos Attack [+]Web Killer Attack [+]Fake Update Attack [+]Fake Access point Attack [+]Wifi Honeypot [+]Wifi Jammer [+]Wifi Dos [+]Wifi Mass De-Authentication Attack [+]Bluetooth POD Attack Project In Github : https://github.com/websploit
    Downloads: 11 This Week
    Last Update:
    See Project
  • 22
    Zulu Trusted Sender | Email Trust Index

    Zulu Trusted Sender | Email Trust Index

    The email trust rating and domain management tool application

    ...This project is designed to provide an simple to use too for email users to quickly understand if a URL (website / email domain) can and should be trusted. It has and will prevent successful spook and phishing attacks and as a by product reduce SPAM volumes significantly. One Project using the original algorithm is Trusted Sender Score and is part of our community initiative. It is expensive to maintain and build all of the necessary additions and improvements and we would love some help.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    ...It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Browserpass

    Browserpass

    Legacy Browserpass repo

    ...Browserpass is a browser extension for zx2c4's pass, a UNIX based password store manager. It allows you to auto-fill or copy to clipboard credentials for the current domain, protecting you from phishing attacks. In order to use Browserpass you must also install a companion native messaging host, which provides an interface to your password store. It uses a native binary written in Golang to do the interfacing with your password store. Secure communication between the binary and the browser extension is handled through native messaging.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    dns2blackhole

    Malware Prevention through Domain Blocking (Black Hole)

    dns2blackhole is a set of FreeBSD Bourne Shell csh scripts that fetch host files from public host file providers that contain the FQDN [ Fully Qualified Domain Names ] of sites that fall into the following categories, adware, malware, exploit, hijackers, harvesters, tracking, phishing, fake news, fraud, spam, sex, porn, gambling, advertisements, misleading marketing, illegal pharmacy, warez/piracy and others. The output of the dns2blackhole scripts is fed directly into the ports/package versions of unbound, named, and dnsmask DNS servers to block those FQDN thus protecting user devices from being compromised or bothered seeing things of no interest. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next