FreeZeroDays / GoPhish-TemplatesLinks
GoPhish Templates that I have retired and/or templates I've recreated.
☆201Updated last year
Alternatives and similar repositories for GoPhish-Templates
Users that are interested in GoPhish-Templates are comparing it to the libraries listed below
Sorting:
- Collection of GoPhish templates available for legitimate usage.☆161Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆558Updated 5 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆437Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆344Updated last year
- Open-Source Phishing Toolkit☆257Updated 5 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆290Updated 5 years ago
- ☆313Updated 2 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆620Updated 7 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- ☆305Updated last year
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆54Updated last year
- PowerShell Ransomware Simulator with C2 Server☆494Updated last year
- Collection of resources related to phishing☆158Updated 4 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- Pentesting automation platform that combines hacking tools to complete assessments☆517Updated this week
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Hiding GoPhish from the boys in blue☆200Updated 3 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆293Updated last month
- ☆133Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆117Updated 4 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Script for generating revshells☆478Updated last year
- Collection of offensive tools targeting Microsoft Azure☆215Updated 2 years ago
- A Zphisher GUI Back-Office Plugin☆234Updated 2 years ago
- Repo containing cracked red teaming tools.☆211Updated last month
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆311Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated 3 months ago