Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!
☆62Jul 9, 2024Updated last year
Alternatives and similar repositories for phishing-templates
Users that are interested in phishing-templates are comparing it to the libraries listed below
Sorting:
- ☆16Jun 15, 2025Updated 8 months ago
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 4 years ago
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated 2 weeks ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆131Dec 8, 2025Updated 2 months ago
- A different approach to writing BOFs in rust.☆19Aug 20, 2025Updated 6 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- ASPX Web Shell with COFF Loader☆79Updated this week
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- ☆75Feb 12, 2026Updated 3 weeks ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆68Feb 3, 2026Updated last month
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- ☆63Apr 4, 2024Updated last year
- Self-mutating macOS implant☆120Dec 18, 2025Updated 2 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆23Nov 23, 2019Updated 6 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Aug 19, 2023Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 5 months ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆112Nov 10, 2023Updated 2 years ago
- ☆48Dec 5, 2025Updated 3 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆166Jul 30, 2025Updated 7 months ago
- Generate DLL proxy/sideload projects. Automatically parses PE export tables and generates ready-to-compile project for red team engagemen…☆100Feb 16, 2026Updated 2 weeks ago
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Seamless remote browser session control☆229Jan 28, 2026Updated last month
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated last year
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆125Aug 19, 2025Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆144Jun 20, 2022Updated 3 years ago
- Hono(RPC) x Next.js (App Router) x RadixUI x Shadcn UI x TailwindCSS x Gsap x Three.js☆14Feb 9, 2024Updated 2 years ago
- ☆12Jun 26, 2023Updated 2 years ago