A collection of phishing samples for researchers and detection developers.
☆421Mar 27, 2026Updated last month
Alternatives and similar repositories for phishing_pot
Users that are interested in phishing_pot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆405Jan 29, 2026Updated 3 months ago
- Shodan Dorks 2023☆244Jan 13, 2025Updated last year
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,557Updated this week
- ☆42Sep 9, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 3 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆165Oct 25, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 5 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆245Sep 6, 2024Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆137Aug 20, 2025Updated 9 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆140Oct 18, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Send phishing messages and attachments to Microsoft Teams users☆1,112Jun 19, 2024Updated last year
- game of active directory☆7,818Mar 12, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,261Mar 28, 2025Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Extract C2 Traffic☆255Nov 25, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆677Feb 17, 2026Updated 3 months ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,835Apr 16, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆268Dec 15, 2025Updated 5 months ago
- ThePhish: an automated phishing email analysis tool☆1,338Aug 1, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- DNSWatch - DNS Traffic Sniffer and Analyzer☆216Feb 15, 2025Updated last year
- ☆138Apr 20, 2023Updated 3 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 3 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆259Nov 24, 2023Updated 2 years ago