LiveGray / OPENORCHID
Collection of GoPhish templates available for legitimate usage.
☆140Updated last year
Related projects: ⓘ
- GoPhish Templates that I have retired and/or templates I've recreated.☆163Updated 3 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- A toolkit for your red team operations☆17Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆104Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆101Updated 8 months ago
- Open-Source Phishing Toolkit☆80Updated 3 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆281Updated 3 years ago
- Python Gmail User Enumeration Tool☆112Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆47Updated 8 months ago
- A Zphisher GUI Back-Office Plugin☆204Updated 11 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆356Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆97Updated last year
- Hiding GoPhish from the boys in blue☆167Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆76Updated 7 months ago
- PACU - Phishing Automation & Campaigning Utility☆38Updated last year
- Phishing Templates☆14Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated 2 weeks ago
- ☆273Updated last year
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆64Updated 2 weeks ago
- Evilginx Phishing Engagement Infrastructure Setup Guide☆276Updated last month
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆149Updated 3 years ago
- ☆38Updated 2 years ago
- ☆132Updated last year
- Automate installation of extra pentest tools on Kali Linux☆40Updated 3 years ago
- Automated rogue access point setup tool.☆190Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆442Updated 3 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- ☆292Updated this week
- Collection of extra pentest tools for Kali Linux☆93Updated last year