List of hostnames and keywords that I've found to be incredibly effective when customizing domains, documents, lures and URLs of live phishing engagements
☆14Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Phishing-Keyword-List
Users that are interested in Phishing-Keyword-List are comparing it to the libraries listed below
Sorting:
- A Case Study in Bypassing Client-Side Anti-Fraud Mechanisms☆74Jan 31, 2026Updated last month
- GitHub 泄露的 API 密钥扫描器。支持 OpenAI/Claude/Gemini/Azure。异步验证 + GPT-4 探测 + 余额检测。丰富的 TUI 控制面板。☆23Jan 11, 2026Updated last month
- ☆12Feb 16, 2017Updated 9 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- 自研的linux_c2☆13Jun 28, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- ☆12Aug 6, 2023Updated 2 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 7 months ago
- ☆13Aug 13, 2024Updated last year
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 8 months ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 7 months ago
- Freebsd KLD Rootkit for FreeBSD 13. Hides files, hides process, hides port, bind shell backdoor☆13Jan 15, 2026Updated last month
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 8 months ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Source code for golang hacking course on Udemy☆11Mar 22, 2020Updated 5 years ago
- Tool developed using csharp (.net 4.5) for compressing and encrypting files to shorten transfer times. Supports multi-file compression an…☆14Feb 15, 2024Updated 2 years ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated 2 weeks ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- 一款用于红队攻防演练协作、渗透测试漏洞生命周期管理平台☆34Nov 24, 2025Updated 3 months ago
- Repository for write-ups of Sofia Santos' OSINT exercises☆18Sep 29, 2025Updated 5 months ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- C2 for studying☆26Aug 10, 2025Updated 6 months ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- shadow tls client☆14Dec 30, 2022Updated 3 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- ☆21Apr 16, 2023Updated 2 years ago
- 强制认证扫描与利用☆12Jul 21, 2023Updated 2 years ago
- A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.☆16Feb 21, 2024Updated 2 years ago
- ☆36Jul 1, 2025Updated 8 months ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 7 months ago