trailofbits / trailofphish
Phishing e-mail repository
☆37Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for trailofphish
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Phishing Toolkit☆19Updated 6 years ago
- ☆26Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆38Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆33Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 6 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 5 months ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆61Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- New and Improved☆16Updated 8 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 8 years ago