FreeZeroDays / GoPhish-TemplatesLinks
GoPhish Templates that I have retired and/or templates I've recreated.
☆206Updated last year
Alternatives and similar repositories for GoPhish-Templates
Users that are interested in GoPhish-Templates are comparing it to the libraries listed below
Sorting:
- Collection of GoPhish templates available for legitimate usage.☆168Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆564Updated 7 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆447Updated 3 years ago
- ☆325Updated 2 years ago
- Open-Source Phishing Toolkit☆269Updated 6 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆290Updated 5 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆348Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated 2 years ago
- Collection of resources related to phishing☆159Updated 4 years ago
- ☆306Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆623Updated 9 months ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- PowerShell Ransomware Simulator with C2 Server☆500Updated last month
- A Zphisher GUI Back-Office Plugin☆236Updated 2 years ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆61Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆120Updated 5 years ago
- ☆133Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Hiding GoPhish from the boys in blue☆202Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆294Updated 2 years ago
- Repo containing cracked red teaming tools.☆220Updated 3 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 4 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated last week
- A WLAN red team framework.☆155Updated 2 weeks ago
- List Of Ransomware Groups Official WebSites☆147Updated last week
- Collection of offensive tools targeting Microsoft Azure☆217Updated 3 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆272Updated 4 years ago