SeanWrightSec / phishing-examples
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆18Updated 3 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below
Sorting:
- Purple Team Workshop by @jorgeorchilles☆11Updated 3 weeks ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆18Updated last year
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 weeks ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆20Updated 5 years ago
- Continuous kerberoast monitor☆45Updated last year
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆28Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago