WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+73707.14%)
Mutual labels: phishing, redteaming
Awesome Red TeamingList of Awesome Red Teaming Resources
Stars: ✭ 4,223 (+30064.29%)
Mutual labels: phishing, redteaming
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (+157.14%)
Mutual labels: red-team-engagement, redteaming
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+464.29%)
Mutual labels: phishing, redteaming
red-tldr-dbRed TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation and try it out.
Stars: ✭ 33 (+135.71%)
Mutual labels: redteaming
TR-PhishingListTürkiye'ye Yönelik Zararlı Bağlantı Erişim Engelleme Listesi
Stars: ✭ 68 (+385.71%)
Mutual labels: phishing
Malicious-Urlv5A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+150%)
Mutual labels: phishing
sharkBest Tool For Phishing, Future Of Phishing
Stars: ✭ 238 (+1600%)
Mutual labels: phishing
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (+28.57%)
Mutual labels: redteaming
gophish-cliGophish Python cli to perform huge phishing campaigns
Stars: ✭ 38 (+171.43%)
Mutual labels: phishing
trailofphishPhishing e-mail repository
Stars: ✭ 33 (+135.71%)
Mutual labels: phishing
dnstwisterDomain name permutation as a service
Stars: ✭ 46 (+228.57%)
Mutual labels: phishing
Phishing-Email-AnalysisUseful resources about phishing email analysis
Stars: ✭ 46 (+228.57%)
Mutual labels: phishing
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+1328.57%)
Mutual labels: phishing
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+500%)
Mutual labels: redteaming
PhlexishAdvanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk
Stars: ✭ 49 (+250%)
Mutual labels: phishing
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (+7.14%)
Mutual labels: phishing
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+671.43%)
Mutual labels: phishing