Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆17Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- ☆10Dec 9, 2018Updated 7 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Apr 12, 2023Updated 2 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- ☆50Dec 15, 2025Updated 3 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Run python from a single exe☆36May 1, 2022Updated 3 years ago
- Launch a command from within Amiberry to the host OS☆10Dec 26, 2025Updated 2 months ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A Vagrantfile and Ansible playbook that can be used to setup test environment with an Exchange server host☆25Jun 14, 2023Updated 2 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- ☆147Oct 29, 2024Updated last year
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Visually diff websites☆20Jan 22, 2018Updated 8 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 5 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- A python3 intruder that gave me bounties, easy to use and as fast as fuff☆38Oct 31, 2020Updated 5 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- Simple command shell collections☆35Mar 7, 2021Updated 5 years ago
- ☆21Jun 2, 2020Updated 5 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- slides for talk given during uscg 2023 combine☆38Sep 6, 2023Updated 2 years ago