Phishing e-mail repository
☆36Apr 7, 2020Updated 5 years ago
Alternatives and similar repositories for trailofphish
Users that are interested in trailofphish are comparing it to the libraries listed below
Sorting:
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- ☆52Apr 14, 2015Updated 10 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- RubySec Field Guide☆40Mar 16, 2023Updated 2 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- Digital Metadata Receive, Record, and Report☆16Oct 3, 2019Updated 6 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Session hijacking GUI tool☆15Oct 20, 2013Updated 12 years ago
- All the python and Pandas tricks I keep forgetting how to do☆18Oct 17, 2020Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- Recursively searches a directory for any file containing a specified string☆48Jul 5, 2015Updated 10 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- ☆21Apr 15, 2016Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆25Aug 22, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago