dafthack / zphisherLinks
Automated Phishing Tool
β11Updated 5 years ago
Alternatives and similar repositories for zphisher
Users that are interested in zphisher are comparing it to the libraries listed below
Sorting:
- Scan git repos for secrets using regex and entropy πβ10Updated 5 years ago
- β134Updated 4 years ago
- links collected from SOC Core Skills classβ85Updated 4 years ago
- β81Updated 5 years ago
- β28Updated 5 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.β215Updated 5 years ago
- Gather Open-Source Intelligence using PowerShell.β177Updated 5 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.β115Updated 9 months ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Securityβ56Updated 4 years ago
- InsightVM helpful SQL queriesβ69Updated 5 months ago
- an awesome list of active defense resourcesβ124Updated 5 years ago
- β61Updated 4 years ago
- β72Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to thβ¦β75Updated 3 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platformβ38Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much moreβ253Updated 2 years ago
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yoβ¦β58Updated 4 years ago
- Trace Labs - Search Party CTF Writeupsβ95Updated 8 months ago
- Submits multiple domains to VirusTotal APIβ60Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.β150Updated 3 years ago
- A list of OSINT Resourcesβ46Updated 2 years ago
- β86Updated 4 years ago
- List of advanced XSS payloadsβ85Updated 8 years ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at anaβ¦β46Updated 4 months ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.β90Updated last year
- Violent Python scripts used in book and few other required filesβ64Updated 6 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. β¦β85Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groupsβ63Updated 8 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changesβ149Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β16Updated 6 years ago