A collection of phishing samples for researchers and detection developers.
☆403Feb 6, 2026Updated last month
Alternatives and similar repositories for phishing_pot
Users that are interested in phishing_pot are comparing it to the libraries listed below
Sorting:
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆396Jan 29, 2026Updated last month
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,525Mar 13, 2026Updated last week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- ☆41Sep 9, 2023Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 11 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆134Aug 20, 2025Updated 7 months ago
- game of active directory☆7,581Mar 12, 2026Updated last week
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆139Oct 18, 2023Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,111Jun 19, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,173Mar 28, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆676Feb 17, 2026Updated last month
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated last week
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆265Dec 15, 2025Updated 3 months ago
- ThePhish: an automated phishing email analysis tool☆1,331Aug 1, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- DNSWatch - DNS Traffic Sniffer and Analyzer☆215Feb 15, 2025Updated last year