All Projects → s1l3nt78 → Tigershark

s1l3nt78 / Tigershark

Licence: unlicense
Bilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Tigershark

Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-41.04%)
Mutual labels:  penetration-testing, pentest-tool, exploitation
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-51.42%)
Mutual labels:  penetration-testing, pentest-tool, exploitation
Dnsmorph
Domain name permutation engine written in Go
Stars: ✭ 148 (-30.19%)
Mutual labels:  penetration-testing, pentest-tool, phishing
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+243.4%)
Mutual labels:  pentest-tool, exploitation, exploitation-framework
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+556.6%)
Mutual labels:  penetration-testing, exploitation
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-10.38%)
Mutual labels:  penetration-testing, exploitation
Mitm Scripts
🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-48.58%)
Mutual labels:  penetration-testing, pentest-tool
Msploitego
Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-41.51%)
Mutual labels:  penetration-testing, pentest-tool
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+514.62%)
Mutual labels:  pentest-tool, exploitation
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-46.23%)
Mutual labels:  exploitation, exploitation-framework
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-38.68%)
Mutual labels:  penetration-testing, pentest-tool
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-6.13%)
Mutual labels:  penetration-testing, exploitation
Darkside
Tool Information Gathering & social engineering Write By [Python,JS,PHP]
Stars: ✭ 159 (-25%)
Mutual labels:  penetration-testing, pentest-tool
Erodir
A fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-55.66%)
Mutual labels:  penetration-testing, pentest-tool
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-49.53%)
Mutual labels:  penetration-testing, pentest-tool
Badpods
A collection of manifests that will create pods with elevated privileges.
Stars: ✭ 93 (-56.13%)
Mutual labels:  penetration-testing, exploitation
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (-18.87%)
Mutual labels:  penetration-testing, pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-58.02%)
Mutual labels:  penetration-testing, pentest-tool
Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+506.6%)
Mutual labels:  pentest-tool, exploitation
Trigmap
A wrapper for Nmap to quickly run network scans
Stars: ✭ 132 (-37.74%)
Mutual labels:  penetration-testing, pentest-tool

CodeFactor




TigerShark

s1l3nt78
The Dead Bunny Collective
Because phishing is a great way to pass the time.

  • Phishing Kit

TigerShark incorporates various different phishing tools, frameworks, domain gathering/generation tools and mail
spammers to create a fully customizable Phishing Kit. This kit allows you to create small to large phishing campaigns,
with customizable payloads, in multiple different scripting languages.

Version 6

@ Additions

  • Blackeye-2.0 - Phishing tool
  • Shikata Gai Ni - Shikata Gai Ni encoder rewritten and optimized in Golang
  • FAQUE - FakeIdentity for Phishing Mails.

CVE's

  • 2018-8174
  • 2018-15982
  • 2019-0768

Note

If you have any issues with a specific tool, 
just remove it from /opt/TigerShark/tools directory
and run the install script again.

Developed for Linux only
Windows creates too many errors leaving this essentially useless

PSA

This framework was made for educational purposes, as well as for use by cyber security professionals with signed written permission, to conduct - and speed up - tasks during a penetration test. This software should not be used within any system or network for which you do not have explicit concent, nor should it be used for any illegal or illicit purposes. The author hereby takes no responsibility for any damages that may be caused by the use of this repository.

Installation

$ git clone https://github.com/s1l3nt78/TigerShark.git
$ cd TigerShark
$ chmod +x install.sh
$ sudo ./install.sh

The install script will allow you the option to use TigerShark from anywhere 
in your shell or just from the install directory. (/opt/TigerShark)

Youtube

  • Setup Video can be found here
    NOTE:It is in spanish i think? But gives a visual idea.

Tools

- HiddenEye
- PhishX
- Weeman
- King-Phisher
- SocialPhish
- Gophish
- Artemis
- PhishBait
- CatPhish
- STP
- PhEmail
- DomainHunter
- CredSniper
- Pupy
- Enigma
- EmailGen
- ie11 Broswer Exploit
- Neos Email Spoofer
- CVE-2018-8174
- Phantom-Evasion
- EvilURL
- Cr3d0v3r
- CuteIt
- ThunderShell
- SpookFlare
- ADV-Phish
- IronSquirrel
- NYAN-x-CAT JS Downloader
- EvilReg
- FakeMailer
- GetDroid
- apkinfector
- PhishMailer
- Adove Flash CVE-2018-15985
- DNS-Persist
- Ghost
- Mouse
- LockPhish
- WhatPhish
- Blackeye-2.0

USER LICENCE

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. THIS TOOL WAS MADE FOR EDUCATIONAL PURPOSES. ALL DAMAGE CAUSED BY ANY ACTIVITIES ILLEGAL OR OTHERWISE, FALLS SOLELY ON THE RESPONSIBILY OF THE USER.

Other Projects

All information on projects in development can be found here.
For any requests or ideas on current projects please submit an issue request to the corresponding tool.
For ideas or collaboration requests on future projects., contact details can be found on the page.

GitHub Pages can be found here.

-Sifter = Osint, Recon and Vuln Scanner
-MkCheck = MikroTik Router Exploitation Tool

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].
OSZAR »