Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-phishing
Collection of resources related to phishing
https://github.com/PhishyAlice/awesome-phishing
Last synced: 1 day ago
JSON representation
-
[↑](#table-of-contents) OSINT for phishers
-
Filtering techniques
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- Using PGP Keys For OSINT
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT Resources for 2019
- Compilation of recon workflows
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- Use buscador osint vm for conducting online investigations
- Open-Source Intelligence (OSINT) Reconnaissance
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
- OSINT: How to find information on anyone
- A Guide to Open Source Intelligence Gathering (OSINT)
-
-
[↑](#table-of-contents) Phishing infrastructure
-
Filtering techniques
- Red Team Infrastructure Wiki
- Latest Trends in Cybersquatting
- Going phishing with terraform
- Building resilient phishing campaign infrastructure
- Practical Phishing with Gophish
- Phishing with Unicode Domains
- Phishing with Cobaltstrike
- Spear Phishing 101
- Expire Phishing Links with Apache RewriteMap
- Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection
- Invalid URI Redirection with Apache mod_rewrite
- Operating System Based Redirection with Apache mod_rewrite
- Combatting Incident Responders with Apache mod_rewrite
- Serving Random Payloads with NGINX
- Curi0usJack .htaccess
- Complete guide creating and hosting phishing page for beginners
- Automating gophish releases
- Mail Server Setup
- Automated red team infrastructure deployment with terraform - part 1
- Automated red team infrastructure deployment with terraform - part 2
- Infrastructure for ongoing red team operations
-
-
[↑](#table-of-contents) Phishing prevention and detection
-
Payload tools
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- How to Recognize Phishing Emails
- Catching phishing before they catch you
- Catching phishing before they catch you
- The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators
- Does Domain Highlighting Help People Identify Phishing Sites?
- Email Phishing Protection Guide – Blog 19: Email Phishing Protection Security Checklist
- Blunting the phishers spear: A risk-based approach
- What can be learned from a phishing domain
- Dealing with cybersquatting, typosquatting and phishing
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Backtrack phishing email using Open-source intelligence gathering
- Phishing - Advanced URL Analysis - Obfuscation, Clickjacking and OSINT Gathering
- Deconstructing the Phishing Campaigns that Target Gmail Users
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
- Catching phishing before they catch you
-
-
[↑](#table-of-contents) Phishing-related scientific research
-
Payload tools
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- Ichthyology-phishing-as-a-science
- DeepPhish: Simulating Malicious AI
- Why Phishing Works
- PhishEye: Live monitoring of sandboxed phishing kits
- Phishnet: predictive blacklisting to detect phishing attacks
- The current state of phishing attacks
- Phishing in the public cloud: You’ve been served
- Decoys, Phishing, and the Cloud: The Latest Fan-out Effect
- Do security toolbars actually prevent phishing attacks?
- Large-scale automatic classification of phishing pages
- Social phishing
- Phishing for phishing awareness
- A Framework for Detection and Measurement of Phishing Attacks
- PHISHING DETECTION VIA ANALYTIC NETWORKS
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- Resurgence of Phishing-as-a-Service (PhaaS) platforms
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- Targeted Attacks Abusing Google Cloud Platform Open Redirection
- Understanding User Behaviors When Phishing Attacks Occur
- Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
- The current state of phishing attacks
-
-
[↑](#table-of-contents) Tools and frameworks
-
OSINT tools
-
Phishing campaign tools
-
Payload tools
-
-
[↑](#table-of-contents) Email security
-
Encryption standards
-
Email authentication
-
Filtering techniques
- Filtering Spam Using Naive Bayes
- Using SpamAssassin
- Sieve Tutorial
- The CRM114 & Mailfilter HOWTO
- fdm/MANUAL
- Nolisting: Poor Man's Greylisting
- DNSBL (DNS Black List)
- The CRM114 & Mailfilter HOWTO
- Spamtrap 101: What they Are, Why You Hit Them, & What to Do About It
- Classify emails into ham and spam using Naive Bayes Classifier
- How to Add Antivirus and Spam Protection to Postfix Mail Server with ClamAV and SpamAssassin – Part 3
- Email Greylisting. How does greylisting work?
- Setting up an email honeypot spamtrap, malware, malspam trap.
-
-
[↑](#table-of-contents) Payloads and filter evasion
-
Filtering techniques
- Evilginx - Advanced Phishing with Two-factor Authentication Bypass
- Evilginx 2 - Next Generation of Phishing 2FA Tokens
- Simulated Phishing Educational Campaign Guide
- Conducting USB Drop Tests With GoPhish
- Executing metasploit empire payloads from ms office documemt properties part 1 of 2
- MetaPhish: PDF Infection, Web SpearPhishing, TOR abuse & communications
- Microsoft office ntlm hashes via frameset
- Phishing Actor Using XOR Obfuscation Graduates to Enterprise Cloud Storage on AWS
- Executing metasploit empire payloads from ms office documemt properties part 2 of 2
- Phishing with powerpoint
- Phishing with empire
- Abusing microsoft word features phishing subdoc
- Phishing against protected view
- csv injection
- Excel macros with powershell
- Hacking into whatsapp series part 2 phishing
- Macro-less code exec in msword
- Powerpoint and custom actions
-
-
[↑](#table-of-contents) Books and ebooks
-
Payload tools
- Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
- Phishing for Phools: The Economics of Manipulation and Deception
- Phishing: Detection, Analysis And Prevention
- Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists
- Social Engineering: The Science of Human Hacking
- Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams
- Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
- Cyberpsychology: The Study of Individuals, Society and Digital Technologies
- Stealing Your Life: The Ultimate Identity Theft Prevention Plan
- Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
- Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
- Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door
-
-
[↑](#table-of-contents) Campaign write-ups
-
Payload tools
- Exposing One of China’s Cyber Espionage Units
- Grizzly Steppe - Russian Malicious Cyber Activity
- Analysing a massive Office 365 phishing campaign
- Gmail Phishing Campaign Racking Up Victims
- Spying on a Budget: Inside a Phishing Operation with Targets in the Tibetan Community
- An OSINT Analysis of the Elon Musk Bitcoin Scam
- Reckless Redux: Senior Mexican Legislators and Politicians Targeted with NSO Spyware
- Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware
- Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans
- Packrat: Seven Years of a South American Threat Actor
- How millions of DSL modems were hacked in Brazil, to pay for Rio prostitutes
- Cloned RFE/RL phishing website in Uzbekistan
- The RSA Hack: How They Did It
- Darknet diaries: The hack
- Tainted Leaks: Disinformation and Phishing With a Russian Nexus
- Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society
- Chinese hackers steal Gmail passwords: Google
-
-
[↑](#table-of-contents) Miscellaneous
-
Phishing economy
-
Phishing ethics
-
Definitions
-
OpSec
-
Phishing quiz
-
Report sites
-
Other
-
Categories
[↑](#table-of-contents) OSINT for phishers
90
[↑](#table-of-contents) Phishing-related scientific research
46
[↑](#table-of-contents) Phishing prevention and detection
39
[↑](#table-of-contents) Miscellaneous
24
[↑](#table-of-contents) Phishing infrastructure
21
[↑](#table-of-contents) Email security
20
[↑](#table-of-contents) Payloads and filter evasion
18
[↑](#table-of-contents) Campaign write-ups
17
[↑](#table-of-contents) Tools and frameworks
14
[↑](#table-of-contents) Books and ebooks
12
Sub Categories