jonathanlr56 / templates-for-gophishLinks
Phishing Templates
☆15Updated 4 years ago
Alternatives and similar repositories for templates-for-gophish
Users that are interested in templates-for-gophish are comparing it to the libraries listed below
Sorting:
- Collection of GoPhish templates available for legitimate usage.☆158Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- ☆31Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- ☆309Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆337Updated last year
- GoPhish Templates that I have retired and/or templates I've recreated.☆197Updated last year
- ☆124Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- Hiding GoPhish from the boys in blue☆199Updated 2 years ago
- Browser streaming MITM proxy☆75Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆155Updated 6 months ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆19Updated 3 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Updated 4 years ago
- ☆44Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆344Updated last year
- Polymorphic Command & Control☆98Updated 8 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year