eman-ekaf / Phishable
Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps orgs investigate phishing campaigns, gauge third-party risk & mitigate these risks. All orgs on the list are exposed to higher risk of threat actors gaining initial entry to their org, supply chain, and customers.
☆22Updated last year
Alternatives and similar repositories for Phishable:
Users that are interested in Phishable are comparing it to the libraries listed below
- ☆9Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- ☆17Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Terminal based fake identity generator.☆27Updated last year
- ☆27Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- ☆13Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fetch information about a public Google document.☆12Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- RATs library 2003 to present☆11Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Automate email search in HaveIBeenPwned☆11Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 9 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- A proving grounds for young and aspiring BBOT modules☆13Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆14Updated 6 months ago