This project aims at training/educating employees about real-life phishing attack scenarios by carrying out simulated spear-phishing attacks.
☆12May 6, 2021Updated 4 years ago
Alternatives and similar repositories for Phish-Me-Not
Users that are interested in Phish-Me-Not are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- A python script to bypass 403-forbidden.☆13Aug 2, 2021Updated 4 years ago
- โปรแกรมจองยานพาหนะ ระบบจองรถออนไลน์ Car Reservation Service (CRS)☆14Mar 16, 2025Updated last year
- Challenges used in CUCTF 2019☆25Oct 13, 2019Updated 6 years ago
- Tries to emulate a tab key press in browser of a real user.☆17Apr 11, 2024Updated last year
- [Academind - 100 Days Of Code: The Complete Web Development Bootcamp]☆10Mar 16, 2023Updated 3 years ago
- Sends email alerts to the public for GOV.UK☆18Mar 18, 2026Updated last week
- Application Security Awareness Training☆23Jul 13, 2020Updated 5 years ago
- Install Omada SDN Controller on Ubuntu, Debian and more Linux distros using Ansible☆13Aug 14, 2025Updated 7 months ago
- Hyperledger Fabric Network for file sharing using Multi-Authority Attribute Based Encryption as the encryption scheme and IPFS as the d…☆12May 6, 2019Updated 6 years ago
- The aim of the project is leverage linear programming in supply chain optimization problem☆19Sep 22, 2020Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- User Authentication REST API built using Node & Express. The REST API include Login, Register, Reset Password, storing Email Subscribers,…☆17Mar 16, 2021Updated 5 years ago
- elliot_on_g0d☆19Jan 24, 2023Updated 3 years ago
- This project ensures that the every detail uploaded by the user on their CVs or resumes is authenticated and stored on IPFS and the trans…☆11Dec 10, 2022Updated 3 years ago
- Command-line tool that helps cybersecurity researchers discover, analyze, and document vulnerabilities from the National Vulnerability Da…☆15Mar 31, 2025Updated 11 months ago
- All notes, slides and assignments for CS231n: Convolutional Neural Networks for Visual Recognition class by Stanford☆26Feb 6, 2021Updated 5 years ago
- Easy Way to install all videos of a paid udemy course☆14Dec 7, 2020Updated 5 years ago
- This research project throws light on important features to look for while detecting phishing mail and also presents a comparative analys…☆11Jul 17, 2021Updated 4 years ago
- The project consists of developing a solution around the problem of Disaster Management. It involves complete assurance that the resource…☆21Nov 27, 2018Updated 7 years ago
- ☕️ A DApp supply chain solution to prove the authenticity of coffee by leveraging the transparency, traceability and efficiency of the Et…☆17Jan 24, 2023Updated 3 years ago
- Fluent API for interacting with Smartsheet☆10Sep 13, 2023Updated 2 years ago
- ☆14Nov 17, 2020Updated 5 years ago
- 🔑 How to unlock a LUKS encrypted Linux server remotely.☆15Dec 15, 2021Updated 4 years ago
- Utility to copy templates, pages, and sending profiles between different Gophish accounts☆19Oct 28, 2020Updated 5 years ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆53Jul 14, 2021Updated 4 years ago
- A professional command-line tool for comprehensive SEO analysis, designed for websites that need to be found in both search results and A…☆46Jan 3, 2026Updated 2 months ago
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆71Dec 28, 2022Updated 3 years ago
- Python http client to make requests based in parameters of .request file☆12May 22, 2023Updated 2 years ago
- A travel booking website which allows user to join trips organized by team and get trip recommendations based on a survey.☆14Jan 22, 2019Updated 7 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- ☆25Jun 26, 2015Updated 10 years ago
- Security awareness base course☆17Oct 16, 2020Updated 5 years ago
- Color Schemes for Konsole Terminal☆10Jun 23, 2022Updated 3 years ago
- ☆28Oct 25, 2020Updated 5 years ago
- Home to all files related to the Bee Motion S3☆16Dec 1, 2023Updated 2 years ago
- Quick commands for pentesting/No typing!☆18Nov 21, 2023Updated 2 years ago
- Track your axie infinity scholars and axies with ease. Made with Next and Node.☆25Apr 2, 2022Updated 3 years ago