SeanWrightSec / phishing-examples
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for phishing-examples
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Python Script for SAML2 Authentication Passwordspray☆37Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- ☆17Updated last year
- Helpful operator notes and techniques in actionable form☆16Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆24Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Ansible role that Installs Mythic☆14Updated 4 months ago
- Continuous kerberoast monitor☆43Updated last year
- Random scripts for azure stuff☆11Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆10Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Repository for LNK stuff☆27Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Caesar-Cipher based encryption☆28Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ☆18Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆14Updated 4 years ago