LiveGray / OPENORCHIDLinks
Collection of GoPhish templates available for legitimate usage.
☆167Updated 2 years ago
Alternatives and similar repositories for OPENORCHID
Users that are interested in OPENORCHID are comparing it to the libraries listed below
Sorting:
- GoPhish Templates that I have retired and/or templates I've recreated.☆205Updated last year
- Open-Source Phishing Toolkit☆266Updated 6 months ago
- A Zphisher GUI Back-Office Plugin☆235Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆119Updated 5 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- Python Gmail User Enumeration Tool☆15Updated 6 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Many Evilginx2 Phishlets Uptodate☆54Updated last month
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆60Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆346Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆108Updated 2 years ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆171Updated 4 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- A toolkit for your red team operations☆34Updated 4 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆165Updated 5 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Phishing Templates☆16Updated 5 years ago
- ☆324Updated 2 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆178Updated last year
- ☆43Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- ☆204Updated 2 years ago