Tactics, Techniques, and Procedures
CtrlK
Personal BlogTwitterGitHubContact
  • Tactics, Techniques, and Procedures
  • ☠️Pentesting
    • Fortress
    • Infrastructure
    • Initial Access
      • Phishing
        • Creating Templates
        • Payloads
          • Non-malicious Callback
          • Macros
    • OSINT
    • Web Applications
    • Wireless
    • Cloud
  • 🧨Red Teaming
    • C2
    • Malware Dev
    • Offensive Infrastructure
    • Offensive Tactics
    • Philosophy
  • 🦋Bug Bounty
    • Bug Bounty Tips & Tricks
  • 📖Resources
    • Blog Posts and Goodies
    • Checklists
    • Offensive Security Notes
    • Tooling Repository
    • Active Directory Toolkit
Powered by GitBook
On this page
  1. ☠️Pentesting
  2. Initial Access
  3. Phishing

Payloads

References

List of resources for phishing payloads

LogoMake phishing great again. VSTO office files are the new macro nightmare?Medium
LogoGitHub - Octoberfest7/XLL_Phishing: XLL Phishing TradecraftGitHub
PreviousLeveraging AI During Template CreationNextNon-malicious Callback

Last updated 3 years ago