SeanWrightSec / phishing-examplesLinks
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆17Updated 4 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below
Sorting:
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- ☆16Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Random scripts for azure stuff☆12Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- ☆18Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- ☆17Updated 5 years ago
- basic proxy as an azure function serverless app☆18Updated 2 years ago
- C# User Simulation☆33Updated 3 years ago