jenyraval / Phishing-SimulationLinks
Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment
☆145Updated 3 years ago
Alternatives and similar repositories for Phishing-Simulation
Users that are interested in Phishing-Simulation are comparing it to the libraries listed below
Sorting:
- A collection of my Dockerfiles☆90Updated 2 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆160Updated 6 months ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆192Updated 6 years ago
- useful pentest note☆68Updated 3 months ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- This reconissance tool is specific written for OSCP engagements.☆56Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Updated 5 years ago
- An epic web shell☆85Updated 4 months ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago