Showing 1 open source project for "phishing%20tool"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • MEXC Digital Asset Services Icon
    MEXC Digital Asset Services

    For anyone interested in a cryptocurrency exchange platform for their cryptocurrency operations, trades and transactions

    Launched by senior quantitative trading teams form Wall St., Europe and Japan in the form of distributed organizations, MEXC (formerly MXC) is committed to providing digital assets followers worldwide with secured, fast, and user-friendly cryptocurrency trading services. Five business models are provided on MEXC platform: Spot Trading, C2C, Derivatives, PoS Pool, and MXC Labs. High-performance mega-transaction matching engine technology. Distributed “Super Node” program for adequate community autonomy. Assets protected by top-level security firms Palmim and Knownsec. MEXC Exchange is an exchange platform focusing on cryptocurrency assets, founded by some senior practitioner in blockchain industry and specialists from Wall Street, Japan, and Europe. MEXC offers safer, smarter, and more convenient exchange services, together with selected blockchain asset, safety insurance, dedicated to building a world-leading cryptocurrency exchange platform.
    Learn More
  • 1
    Seeker

    Seeker

    Accurately Locate Smartphones using Social Engineering

    Seeker is an open source project that demonstrates how to obtain precise location information from devices using social engineering and web-based techniques. The tool sets up a phishing page that asks for location permissions, allowing GPS and other device data to be shared if the user consents. It can capture latitude, longitude, accuracy, altitude, direction, and even speed, with results displayed in a terminal. The project supports both manual deployment and tunneling services like Ngrok for external access. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next