Swordphish Phishing Awareness Tool
☆226Sep 22, 2024Updated last year
Alternatives and similar repositories for swordphish-awareness
Users that are interested in swordphish-awareness are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Outlook add-in companion to report suspicious mail easily☆133Sep 1, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆936Dec 16, 2025Updated 3 months ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- ☆17May 7, 2019Updated 6 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Fast Incident Response☆2,002Apr 7, 2026Updated last week
- Incident Response Methodologies☆1,019Aug 2, 2018Updated 7 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- Find abuse contacts for observables☆69Nov 10, 2022Updated 3 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- Simple Microsoft Windows sessions event logs visualization☆156May 2, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆526Aug 11, 2023Updated 2 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 8 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 6 months ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,367Updated this week
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- DFIRTrack - The Incident Response Tracking Application☆533Jan 13, 2026Updated 3 months ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- ☆333Dec 8, 2022Updated 3 years ago
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,344Dec 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Ruby on Rails Phishing Framework☆889Nov 7, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆318Mar 31, 2021Updated 5 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago