LinkSec / phishing-templates
Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!
☆30Updated 10 months ago
Alternatives and similar repositories for phishing-templates
Users that are interested in phishing-templates are comparing it to the libraries listed below
Sorting:
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆130Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- Ready to go Phishing Platform☆40Updated 7 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆33Updated this week
- POC | Steal user WhatsApp information/data☆54Updated last week
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- ☆20Updated 2 years ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆22Updated 9 months ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆23Updated 9 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆72Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- Python3 script to dump breach data from Dehashed☆28Updated last week
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆73Updated last week
- Browser streaming MITM proxy☆63Updated last year
- Here are +200 different rats some with source code☆95Updated last year
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated 3 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆38Updated 7 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆13Updated 7 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Dogma V1.5.3☆30Updated 5 years ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago