A collection of phishing samples for researchers and detection developers.
☆408Mar 27, 2026Updated 2 weeks ago
Alternatives and similar repositories for phishing_pot
Users that are interested in phishing_pot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆402Jan 29, 2026Updated 2 months ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,536Updated this week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆41Sep 9, 2023Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- ☆164Oct 25, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆135Aug 20, 2025Updated 7 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆140Oct 18, 2023Updated 2 years ago
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,722Mar 21, 2026Updated 2 weeks ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 3 months ago
- ThePhish: an automated phishing email analysis tool☆1,330Aug 1, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆19Mar 27, 2024Updated 2 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- DNSWatch - DNS Traffic Sniffer and Analyzer☆215Feb 15, 2025Updated last year
- ☆137Apr 20, 2023Updated 2 years ago