PhishyAlice / awesome-phishingLinks
Collection of resources related to phishing
☆158Updated 4 years ago
Alternatives and similar repositories for awesome-phishing
Users that are interested in awesome-phishing are comparing it to the libraries listed below
Sorting:
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- Windows for Red Teamers☆127Updated 3 years ago
- Phishing Framework for Pentesters☆200Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- Repository of CVE found by OCD people☆83Updated 6 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆125Updated 4 months ago
- MOVEit CVE-2023-34362☆139Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆329Updated last year
- A WLAN red team framework.☆155Updated last year
- Hiding GoPhish from the boys in blue☆200Updated 3 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- ☆197Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Notes, red team materials, testing tools, etc.☆155Updated last year
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆78Updated 2 weeks ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year
- Active Directory Penetration Testing for Red Teams☆59Updated last year
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆88Updated 4 years ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆186Updated 2 years ago
- Wordlists handcrafted (and automated) with ♥☆224Updated 5 months ago
- Red Team Guides☆144Updated 2 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆135Updated 3 years ago
- A collection of red blue team staff☆48Updated 2 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last month