The Rogue Access Point Framework
-
Updated
Aug 16, 2020 - Python
{{ message }}
The Rogue Access Point Framework
List of Awesome Red Teaming Resources
Modlishka. Reverse Proxy.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
Phishing catcher using Certstream
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
pentest framework
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Automated Phishing Tool
Ruby on Rails Phishing Framework
Most .py files use #!/usr/bin/python3 as shebang, but few others use #!/usr/bin/env python3.
Files which use #!/usr/bin/env python3:
./contrib/eventdb/common.py
./intelmq/bin/intelmq_generate_misp_objects_templates.py
./intelmq/tests/bots/parsers/github_feed/test_parser.py
These files should use #!/usr/bin/python3 for the sake of consistency.
Simple script that checks a domain for email protections
This is Advance Phishing Tool ! OTP PHISHING
Advanced Phishing tool for Linux & Termux
Exchange Transport rules to detect and enable response to phishing
Information gathering & website reconnaissance | https://phishstats.info/
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams
Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
Dashboard to collect, analyze, and respond to reported phishing emails.
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Add a description, image, and links to the phishing topic page so that developers can more easily learn about it.
To associate your repository with the phishing topic, visit your repo's landing page and select "manage topics."
What version of Gophish are you using?: 7.1
Brief description of the issue: There are a few tag suggestions I'd like to make to make campaigns and reporting easier to handle.
Date Tag: