PhishyAlice / awesome-phishingLinks
Collection of resources related to phishing
☆146Updated 4 years ago
Alternatives and similar repositories for awesome-phishing
Users that are interested in awesome-phishing are comparing it to the libraries listed below
Sorting:
- Windows for Red Teamers☆126Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆110Updated last year
- Phishing Framework for Pentesters☆189Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Repository of CVE found by OCD people☆77Updated 3 weeks ago
- Divide full port scan results and use it for targeted Nmap runs☆325Updated last year
- Hiding GoPhish from the boys in blue☆190Updated 2 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- Wordlists handcrafted (and automated) with ♥☆218Updated 4 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- ☆99Updated 3 years ago
- MOVEit CVE-2023-34362☆138Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆83Updated 4 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last year
- Notes, red team materials, testing tools, etc.☆140Updated 8 months ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆131Updated 2 years ago
- Attack Surface Discovery Tool☆108Updated 10 months ago
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆119Updated last year
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆160Updated 4 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆108Updated last month
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆439Updated last year
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆81Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- ☆298Updated 2 years ago
- An XSS Exploitation Tool☆318Updated 3 weeks ago
- Collection of offensive tools targeting Microsoft Azure☆210Updated 2 years ago