https://github.com/htr-tech/zphisher
https://www.kitploit.com/2020/05/nexphisher-advanced-phishing-tool-for.html
https://github.com/curtbraz/Phishing-API
ftp://ftp.openwall.com/pub/wordlists/
http://www.openwall.com/mirrors/
https://github.com/danielmiessler/SecLists
http://www.outpost9.com/files/WordLists.html
http://www.vulnerabilityassessment.co.uk/passwords.htm
http://packetstormsecurity.org/Crackers/wordlists/
http://www.ai.uga.edu/ftplib/natural-language/moby/
http://wordlist.sourceforge.net/
https://github.com/berzerk0/Probable-Wordlists
https://weakpass.com/wordlist
https://pypi.org/project/wordlist/
https://packages.debian.org/jessie/wordlist
Use crunch to create a wordlist "on-the-fly" (without wasting
storage) - pipe that to john with --session option (you can resume the
cracking process) and give that to aircrack (-w - // without password
list since crunch is creating it)john --wordlist=all.lst --rules mypasswd &Obviously, the "&" is specific to Unix shells and will not work on most other platforms.
john --session=allrules --wordlist=all.lst --rules mypasswd &This ensures that you won't accidentally interfere with the instance of John running in the background if you proceed to start other sessions.
john --statusfor the default session or:
john --status=allrules