CanIBeSpoofed is a console project utilising functionality built for the https://caniphish.com/free-phishing-tools/email-spoofing-test website. This project facilitates scanning of domains to gain visibility over email supply chain and SPF/DMARC vulnerabilities.
☆46Jan 26, 2025Updated last year
Alternatives and similar repositories for CanIBeSpoofed
Users that are interested in CanIBeSpoofed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Oct 29, 2022Updated 3 years ago
- An addon to import users from active directory to gophish☆18Mar 22, 2022Updated 4 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- Libretto is a Golang library to create Virtual Machines (VM) on any cloud and Virtual Machine hosting platforms such as AWS, Azure, OpenS…☆22Mar 16, 2016Updated 10 years ago
- ☆10May 8, 2021Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- AWS Lambda shell commands in $PATH available to runtime subprocesses☆12Sep 1, 2021Updated 4 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark (http…☆13Jan 18, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Nov 1, 2018Updated 7 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆24Mar 14, 2026Updated last week
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- An autonomous OSINT agent for social media using any OpenAI-compatible API for deep analysis and reporting.☆56Mar 19, 2026Updated last week
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated last month
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- A JavaScript-based DDoS attack☆11Jul 17, 2025Updated 8 months ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Oct 27, 2022Updated 3 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 7 years ago
- Conserving defunct software, wares, and elite digital subcultures of the PC.☆12Updated this week
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,683May 13, 2022Updated 3 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- ☆11May 30, 2021Updated 4 years ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Feb 20, 2026Updated last month
- API Utility for TOR(The Onion ROUTER) such as requesting a new IP, or generating API password. Uses Network API for control☆12Feb 27, 2025Updated last year