securitywithoutborders / guide-to-phishing
☆19Updated 5 years ago
Alternatives and similar repositories for guide-to-phishing:
Users that are interested in guide-to-phishing are comparing it to the libraries listed below
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- All xxx-arsenal repos in one☆15Updated 5 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- ☆69Updated 6 years ago
- Maltego integration of https://clearbit.com☆36Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆18Updated 7 years ago
- WebHook for Red Team☆24Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Vigilante.pw - The Breached Database Directory (BACKUP)☆16Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- ☆24Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆14Updated 6 years ago
- 😈 The Demon App Store☆28Updated 3 years ago
- Repository of tools used in my blog☆50Updated 9 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Windows Keylogger in C++☆17Updated 2 years ago