Phishing Framework for Pentesters
☆201May 16, 2023Updated 2 years ago
Alternatives and similar repositories for phishmonger
Users that are interested in phishmonger are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆208Apr 3, 2025Updated 11 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆611Dec 9, 2025Updated 3 months ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- High speed/Low cost CommonCrawl RegExp in Node.js☆257Apr 6, 2024Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆262Mar 15, 2024Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Apr 20, 2021Updated 4 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆360May 31, 2024Updated last year
- Open-Source Collection of Social Engineering Pretexts☆142Nov 21, 2023Updated 2 years ago
- Mass target enumeration☆32Apr 3, 2021Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A real fake social engineering app☆131Jul 13, 2025Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Nov 21, 2024Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆330Updated this week
- SAM Dumping in C#☆54Nov 27, 2025Updated 3 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆382Jan 19, 2023Updated 3 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- Modular Enumeration and Password Spraying Framework☆128Apr 10, 2024Updated last year
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆138Dec 7, 2025Updated 3 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆545Jun 3, 2025Updated 9 months ago
- RDP Checker☆64Feb 23, 2024Updated 2 years ago
- evilginx3 + gophish☆1,970Jun 15, 2024Updated last year
- Infrastructure Automation☆357Apr 12, 2024Updated last year
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago