AlternativeTo Logo

Apps with 'Phishing' feature

  1. Thanks to the Shadow apps, any under-powered PC, old Mac or smartphone becomes a high-end Windows 10 machine. Start a game in front of the television and finish it on the go. Work with 3D rendering software on a tablet. Give the best you have to give. Anytime.

  2. MailScanner is a open source email security system design for Linux-based email gateways. It is used at over 30,000 sites around the world, protecting top government departments, commercial corporations and educational institutions.

    No screenshots yet


  3. PhishSafety provides realistic phishing simulations and training to help educate your employees and keep your company safe.

  4. Train, test and track your security awareness in one comprehensive solution. High quality cyber training that impresses your users and meets board requirements. Integrated phishing simulation to test the efficacy of your awareness program.

  5. Anti-spam gateway blocks more than 99% of spam with less than one in 1 million false positives and real-time automatic updates.

    No screenshots yet
  6. Dr. Link Check helps you track down broken and malicious links on your website. The service crawls through the entire code of your site and gives each discovered link a thorough examination.

  7. ALTOSPAM is an integrated SaaS software protecting your email from spams, viruses, scams and phishing. It allows companies owning at least one domain name to secure its email servers.

  8. ScamBlockPlus can be useful to both business employees who work on the internet, and to private people who need protection from online phishing scams.

  9. PhishMe entails periodically immersing employees in simulated phishing scenarios with targeted, engaging education delivered to those found susceptible.

    No screenshots yet
  10. The PhishFeed API puts attack details right at your fingertips, making it easier to identify threats and enabling faster brand protection.

    No screenshots yet
    • FreeOpen Source
    • Mac
    • Windows
    • Linux
    • BSD

    Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication.

    • Self-Hosted
    • Microsoft Exchange Server
    • Software as a Service (SaaS)
    • Microsoft Office 365
    • Gmail

    Human Layer Email and Messaging Security.

    No screenshots yet
    • Online
    • Software as a Service (SaaS)

    CyberHoot is a combination of a Learning Management System and a Governance, Risk, and compliance tool. CyberHoot is known for being one of the simplest, and most automated solutions on the market.

    No screenshots yet
  11. Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks.