SeanWrightSec / phishing-examples
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆18Updated 3 years ago
Alternatives and similar repositories for phishing-examples:
Users that are interested in phishing-examples are comparing it to the libraries listed below
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last year
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆24Updated 7 months ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Deployment code for ashirt-server☆19Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆23Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆11Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- ☆16Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆20Updated 5 years ago
- Ansible role that Installs Mythic☆15Updated 9 months ago