trailofbits / trailofphish
Phishing e-mail repository
☆37Updated 4 years ago
Alternatives and similar repositories for trailofphish:
Users that are interested in trailofphish are comparing it to the libraries listed below
- Phishing Toolkit☆20Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Just a collection of scripts☆40Updated 4 years ago
- ☆27Updated 7 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 8 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- ☆16Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- See here:☆42Updated 12 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 3 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago