SeanWrightSec / phishing-examplesLinks
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆18Updated 3 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below
Sorting:
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- ☆14Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆39Updated last year
- ☆18Updated last year
- Continuous kerberoast monitor☆45Updated last year
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- ☆20Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- ☆17Updated 5 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Repository for LNK stuff☆30Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- Ansible role that Installs Mythic☆17Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago