List of hostnames and keywords that I've found to be incredibly effective when customizing domains, documents, lures and URLs of live phishing engagements
☆14Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Phishing-Keyword-List
Users that are interested in Phishing-Keyword-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Oct 19, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Shell scripts to make Android development a bit easier☆16May 30, 2019Updated 6 years ago
- Oem Lock is an Android command-line tool that checks whether OEM unlock is allowed by the carrier and device.☆22Oct 16, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆621Apr 2, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 4 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- ☆11Aug 11, 2014Updated 11 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Feb 16, 2017Updated 9 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Integration tools for TheHive and Azure Sentinel☆13Sep 23, 2020Updated 5 years ago
- Aggregation of Newly Registered Domains (NRD) in adblock and hosts format☆18Apr 11, 2025Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifical…☆695May 27, 2025Updated 10 months ago
- Carrier Unlock and use any SIM CARD on your smartphone! FREE OF CHARGE!☆34Jul 22, 2023Updated 2 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆13Aug 13, 2024Updated last year
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- 自研的linux_c2☆13Jun 28, 2023Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Tool developed using csharp (.net 4.5) for compressing and encrypting files to shorten transfer times. Supports multi-file compression an…☆14Feb 15, 2024Updated 2 years ago
- EmailScanner is an integration application in python that uses `exchangelib` to process mail items in Microsoft exchange.☆12Apr 9, 2019Updated 7 years ago
- PDF Icon File Type Spoofer☆17Jul 8, 2024Updated last year
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Source code for golang hacking course on Udemy☆11Mar 22, 2020Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago