Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-phishing
https://github.com/H4CK3RT3CH/awesome-phishing
Last synced: 4 days ago
JSON representation
-
[↑](#table-of-contents) OSINT for phishers
-
Filtering techniques
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- OSINT: How to find information on anyone
- Use buscador osint vm for conducting online investigations
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT Resources for 2019
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- Using PGP Keys For OSINT
- Open-Source Intelligence (OSINT) Reconnaissance
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
-
-
[↑](#table-of-contents) Phishing prevention and detection
-
Payload tools
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Does Domain Highlighting Help People Identify Phishing Sites?
- Backtrack phishing email using Open-source intelligence gathering
- Phishing - Advanced URL Analysis - Obfuscation, Clickjacking and OSINT Gathering
- Blunting the phishers spear: A risk-based approach
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- What can be learned from a phishing domain
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Deconstructing the Phishing Campaigns that Target Gmail Users
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Dealing with cybersquatting, typosquatting and phishing
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
-
-
[↑](#table-of-contents) Phishing-related scientific research
-
Payload tools
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- PhishEye: Live monitoring of sandboxed phishing kits
- Phishnet: predictive blacklisting to detect phishing attacks
- The current state of phishing attacks
- Resurgence of Phishing-as-a-Service (PhaaS) platforms
- Large-scale automatic classification of phishing pages
- Social phishing
- Phishing for phishing awareness
- The current state of phishing attacks
- The current state of phishing attacks
- DeepPhish: Simulating Malicious AI
- The current state of phishing attacks
- Phishing in the public cloud: You’ve been served
- Decoys, Phishing, and the Cloud: The Latest Fan-out Effect
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- Understanding User Behaviors When Phishing Attacks Occur
- Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter
- The current state of phishing attacks
- The current state of phishing attacks
- Ichthyology-phishing-as-a-science
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- Targeted Attacks Abusing Google Cloud Platform Open Redirection
- The current state of phishing attacks
- A Framework for Detection and Measurement of Phishing Attacks
- PHISHING DETECTION VIA ANALYTIC NETWORKS
- The current state of phishing attacks
- The current state of phishing attacks
-
-
[↑](#table-of-contents) Campaign write-ups
-
Payload tools
- Packrat: Seven Years of a South American Threat Actor
- Cloned RFE/RL phishing website in Uzbekistan
- Grizzly Steppe - Russian Malicious Cyber Activity
- Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware
- How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes
- Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans
- Darknet diaries: The hack
- Tainted Leaks: Disinformation and Phishing With a Russian Nexus
- Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society
- An OSINT Analysis of the Elon Musk Bitcoin Scam
- Reckless Redux: Senior Mexican Legislators and Politicians Targeted with NSO Spyware
- Analysing a massive Office 365 phishing campaign
- Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community
- Chinese hackers steal Gmail passwords: Google
-
-
[↑](#table-of-contents) Tools and frameworks
-
OSINT tools
-
Payload tools
-
Phishing campaign tools
-
-
[↑](#table-of-contents) Email security
-
Filtering techniques
- The CRM114 & Mailfilter HOWTO
- Email Greylisting. How does greylisting work?
- How to Add Antivirus and Spam Protection to Postfix Mail Server with ClamAV and SpamAssassin – Part 3
- Spamtrap 101: What they Are, Why You Hit Them, & What to Do About It
- Using SpamAssassin
- Sieve Tutorial
- fdm/MANUAL
- Nolisting: Poor Man's Greylisting
- Classify emails into ham and spam using Naive Bayes Classifier
- Setting up an email honeypot spamtrap, malware, malspam trap.
-
Email authentication
-
Encryption standards
-
-
[↑](#table-of-contents) Payloads and filter evasion
-
Filtering techniques
- Executing metasploit empire payloads from ms office documemt properties part 2 of 2
- Evilginx - Advanced Phishing with Two-factor Authentication Bypass
- Phishing with powerpoint
- Phishing with empire
- Executing metasploit empire payloads from ms office documemt properties part 1 of 2
- Microsoft office ntlm hashes via frameset
- Phishing Actor Using XOR Obfuscation Graduates to Enterprise Cloud Storage on AWS
- Excel macros with powershell
- Hacking into whatsapp series part 2 phishing
- Macro-less code exec in msword
- Abusing microsoft word features phishing subdoc
- Phishing against protected view
- csv injection
- Conducting USB Drop Tests With GoPhish
- Evilginx 2 - Next Generation of Phishing 2FA Tokens
- Simulated Phishing Educational Campaign Guide
- Powerpoint and custom actions
-
-
[↑](#table-of-contents) Phishing infrastructure
-
Filtering techniques
- Combatting Incident Responders with Apache mod_rewrite
- Curi0usJack .htaccess
- Spear Phishing 101
- Red Team Infrastructure Wiki
- Going phishing with terraform
- Building resilient phishing campaign infrastructure
- Practical Phishing with Gophish
- Phishing with Unicode Domains
- Phishing with Cobaltstrike
- Serving Random Payloads with NGINX
- Complete guide creating and hosting phishing page for beginners
- Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection
- Invalid URI Redirection with Apache mod_rewrite
- Automated red team infrastructure deployment with terraform - part 2
- Mail Server Setup
- Expire Phishing Links with Apache RewriteMap
- Operating System Based Redirection with Apache mod_rewrite
- Automated red team infrastructure deployment with terraform - part 1
- Automating gophish releases
-
-
[↑](#table-of-contents) Books and ebooks
-
Payload tools
- Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
- Social Engineering: The Science of Human Hacking
- Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams
- Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
- Cyberpsychology: The Study of Individuals, Society and Digital Technologies
- Phishing for Phools: The Economics of Manipulation and Deception
- Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists
- Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
- Stealing Your Life: The Ultimate Identity Theft Prevention Plan
- Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
- Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
-
-
[↑](#table-of-contents) Miscellaneous
-
OpSec
-
Phishing quiz
-
Report sites
-
Other
-
Phishing economy
-
Definitions
-
Phishing ethics
-
Categories
[↑](#table-of-contents) OSINT for phishers
93
[↑](#table-of-contents) Phishing-related scientific research
46
[↑](#table-of-contents) Phishing prevention and detection
38
[↑](#table-of-contents) Miscellaneous
21
[↑](#table-of-contents) Phishing infrastructure
19
[↑](#table-of-contents) Payloads and filter evasion
17
[↑](#table-of-contents) Campaign write-ups
14
[↑](#table-of-contents) Email security
14
[↑](#table-of-contents) Tools and frameworks
13
[↑](#table-of-contents) Books and ebooks
11
Sub Categories