PhishyAlice / awesome-phishing
Collection of resources related to phishing
☆134Updated 3 years ago
Alternatives and similar repositories for awesome-phishing:
Users that are interested in awesome-phishing are comparing it to the libraries listed below
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆106Updated last year
- Windows for Red Teamers☆127Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆156Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆90Updated 8 months ago
- Notes, red team materials, testing tools, etc.☆133Updated 3 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆88Updated last year
- Red Team Guides☆135Updated last year
- Collection of offensive tools targeting Microsoft Azure☆204Updated 2 years ago
- Hiding GoPhish from the boys in blue☆174Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆296Updated last year
- Password spraying tool and Bloodhound integration☆220Updated last month
- Phishing Framework for Pentesters☆162Updated last year
- ☆158Updated 3 years ago
- ☆96Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- List of red team resources☆91Updated 7 years ago
- Powershell script to extract information from boot PXE☆138Updated 5 years ago
- PowerShell Asynchronous TCP Reverse Shell☆154Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆283Updated last week
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆83Updated 4 years ago
- LDAP enumeration tool implemented in Python3☆224Updated 4 months ago
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆318Updated 3 months ago
- Wordlists handcrafted (and automated) with ♥☆215Updated 10 months ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆116Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- A WLAN red team framework.☆149Updated 4 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- ☆288Updated last year