LiveGray / OPENORCHID
Collection of GoPhish templates available for legitimate usage.
☆144Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OPENORCHID
- GoPhish Templates that I have retired and/or templates I've recreated.☆164Updated 5 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆376Updated 2 years ago
- Phishing Templates☆15Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆107Updated 3 years ago
- Many Evilginx2 Phishlets Uptodate☆48Updated 10 months ago
- Open-Source Phishing Toolkit☆99Updated last month
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆85Updated 4 months ago
- Evilginx Phishing Engagement Infrastructure Setup Guide☆301Updated last month
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆285Updated 3 years ago
- A Zphisher GUI Back-Office Plugin☆208Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆103Updated 10 months ago
- A toolkit for your red team operations☆17Updated 3 years ago
- ☆275Updated last year
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆577Updated 3 weeks ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆452Updated 5 months ago
- sturdy-chainsaw☆52Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- ☆30Updated 2 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆106Updated last month
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 4 months ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆18Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 5 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆99Updated last year
- Phishlets for Evilginx2 (MITM proxy Framework)☆147Updated 4 years ago