PhishyAlice / awesome-phishing
Collection of resources related to phishing
☆139Updated 3 years ago
Alternatives and similar repositories for awesome-phishing:
Users that are interested in awesome-phishing are comparing it to the libraries listed below
- Windows for Red Teamers☆125Updated 2 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- Hiding GoPhish from the boys in blue☆179Updated 2 years ago
- Phishing Framework for Pentesters☆165Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- MOVEit CVE-2023-34362☆139Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 10 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆298Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆186Updated 2 years ago
- List of red team resources☆91Updated 7 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆290Updated last week
- Browser extension that extracts users from LinkedIn company pages☆157Updated last year
- Wordlists handcrafted (and automated) with ♥☆215Updated 3 weeks ago
- ☆291Updated last year
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆206Updated 2 years ago
- A certificate transparency log keyword sniffer written in python☆82Updated last year
- Notes, red team materials, testing tools, etc.☆135Updated 5 months ago
- ☆96Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆264Updated 2 years ago
- Password spraying tool and Bloodhound integration☆229Updated 3 months ago
- Red Team Guides☆136Updated last year
- Web Hacking and Red Teaming MindMap☆71Updated 2 years ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- Nuclei templates for honeypots detection.☆195Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year