A collection of phishing samples for researchers and detection developers.
☆419Mar 27, 2026Updated last month
Alternatives and similar repositories for phishing_pot
Users that are interested in phishing_pot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆404Jan 29, 2026Updated 3 months ago
- Shodan Dorks 2023☆244Jan 13, 2025Updated last year
- Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing dom…☆1,545Updated this week
- ☆41Sep 9, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Dec 5, 2023Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆164Oct 25, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 4 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆245Sep 6, 2024Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Aug 20, 2025Updated 8 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆140Oct 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- game of active directory☆7,753Mar 12, 2026Updated last month
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 4 months ago
- ThePhish: an automated phishing email analysis tool☆1,334Aug 1, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- DNSWatch - DNS Traffic Sniffer and Analyzer☆216Feb 15, 2025Updated last year
- ☆138Apr 20, 2023Updated 3 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago