Phishing e-mail repository
☆36Apr 7, 2020Updated 5 years ago
Alternatives and similar repositories for trailofphish
Users that are interested in trailofphish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Measure branching along code paths☆18Oct 25, 2016Updated 9 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- All the python and Pandas tricks I keep forgetting how to do☆18Oct 17, 2020Updated 5 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- ☆21Updated this week
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Python Dictionary Ingestion Made Easy - Load & convert dictionary Data into python Classes and Dataclasses☆16Dec 9, 2024Updated last year
- Latest FUD GMail phishing webpage generator☆31Jun 27, 2020Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- Digital Metadata Receive, Record, and Report☆16Oct 3, 2019Updated 6 years ago
- A nodejs web application honeypot☆47Aug 23, 2015Updated 10 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆16Aug 4, 2020Updated 5 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆49Mar 8, 2026Updated 2 weeks ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- PyData Boston 2013 talks: "Intro to scikit-learn" & "Realtime Predictive Analytics: Using scikit-learn and RabbitMQ"☆11Jan 5, 2014Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 3 years ago