jonathanlr56 / templates-for-gophishLinks
Phishing Templates
☆15Updated 4 years ago
Alternatives and similar repositories for templates-for-gophish
Users that are interested in templates-for-gophish are comparing it to the libraries listed below
Sorting:
- Collection of GoPhish templates available for legitimate usage.☆160Updated 2 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆192Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- ☆304Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆314Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆38Updated 2 years ago
- ☆31Updated 3 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆294Updated 4 years ago
- ☆123Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated last week
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated last year
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆171Updated 6 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆71Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- ☆101Updated 3 years ago
- Hiding GoPhish from the boys in blue☆197Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 8 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆150Updated 5 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year