SeanWrightSec / phishing-examplesLinks
Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustrate some of the things to look out for when attempting to evaluate an email as being a phishing email or not.
☆17Updated 4 years ago
Alternatives and similar repositories for phishing-examples
Users that are interested in phishing-examples are comparing it to the libraries listed below
Sorting:
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- ☆20Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated last year
- ☆16Updated 4 years ago
- Random scripts for azure stuff☆13Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago