pentestgeek / phishing-frenzy-templates
Phishing Scenarios Used for Phishing Frenzy
☆206Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for phishing-frenzy-templates
- Phishing Template Generation Made Easy☆162Updated 6 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆257Updated 8 years ago
- A ton of helpful tools☆335Updated 3 years ago
- Templates for the King Phisher open source phishing campaign toolkit.☆165Updated 5 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆166Updated 8 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆164Updated 6 years ago
- myBFF - a Brute Force Framework☆137Updated 10 months ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆245Updated last year
- locate and attack Lync/Skype for Business☆333Updated last month
- Auto Domain Admin and Network Exploitation.☆296Updated 6 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆130Updated 2 years ago
- Wavestone's web interface for password cracking with hashcat☆166Updated 3 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆82Updated 3 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆443Updated 2 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated last week
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆229Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆304Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆390Updated 4 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Various Cheat Sheets☆179Updated 3 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆315Updated 6 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated 11 months ago
- WIreless Hacking Tools☆161Updated 11 years ago
- ☆423Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- For all your network pentesting needs☆150Updated 4 months ago
- Remote Recon and Collection☆447Updated 6 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆345Updated 3 months ago
- Rapid Attack Infrastructure (RAI)☆297Updated 3 years ago