Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!
☆67Jul 9, 2024Updated last year
Alternatives and similar repositories for phishing-templates
Users that are interested in phishing-templates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BruteMailer is a python3 tool for hacking different email services' user accounts such as Gmail,outlook through bruteforcing, it also com…☆12Jun 18, 2025Updated 9 months ago
- Shodan-Grabber is a Node.js tool for scraping IP addresses and other information from Shodan's web interface. It utilizes Puppeteer for w…☆17Nov 13, 2024Updated last year
- ☆16Jun 15, 2025Updated 9 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Mar 19, 2026Updated last week
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆134Dec 8, 2025Updated 3 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆454Apr 29, 2022Updated 3 years ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated 2 weeks ago
- A clone of the login page for Microsoft accounts☆51Mar 19, 2023Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Phishing Templates☆16Jan 13, 2021Updated 5 years ago
- A different approach to writing BOFs in rust.☆20Aug 20, 2025Updated 7 months ago
- ☆12Sep 12, 2020Updated 5 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- ☆80Feb 12, 2026Updated last month
- BeautifulSoup+Requests based Web Scrapers☆13Jun 12, 2020Updated 5 years ago
- All crack email (yahoospambox:hotmai) ...... created by mohammad && arman☆10Sep 5, 2020Updated 5 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Social Engineering Tool Oriented to facebook☆58Apr 7, 2017Updated 8 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 3 months ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 9 months ago
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆29Feb 4, 2026Updated last month
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- Self-mutating macOS implant☆126Mar 16, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Powershell script that extracts and steals browser-saved passwords☆21Mar 13, 2023Updated 3 years ago
- A Project that uses Zillow research data on Quandl, Prophet for time series forecasting, Altair for vega-lite charts and Folium for an cr…☆12Dec 8, 2022Updated 3 years ago
- ☆63Apr 4, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- ☆38Feb 27, 2026Updated last month
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 4 years ago