Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆17Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 8 months ago
- ☆10Dec 9, 2018Updated 7 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Apr 12, 2023Updated 3 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 4 months ago
- ☆32Sep 23, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- ☆50Dec 15, 2025Updated 3 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Run python from a single exe☆36May 1, 2022Updated 3 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Launch a command from within Amiberry to the host OS☆11Dec 26, 2025Updated 3 months ago
- Scanner for Cross-Site WebSocket Hijacking☆41Feb 19, 2026Updated last month
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- A Vagrantfile and Ansible playbook that can be used to setup test environment with an Exchange server host☆25Jun 14, 2023Updated 2 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 4 years ago
- ☆147Oct 29, 2024Updated last year
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- SANS Holiday Hack Challenge write-up template☆28Nov 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Visually diff websites☆20Jan 22, 2018Updated 8 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 5 years ago
- A python3 intruder that gave me bounties, easy to use and as fast as fuff☆38Oct 31, 2020Updated 5 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago