bars
Tactics, Techniques, and Procedures
search
circle-xmark
Ctrl
k
Personal Blog
Twitter
GitHub
Contact
More
ellipsis
chevron-down
copy
Copy
chevron-down
☠️
Pentesting
chevron-right
Initial Access
chevron-right
Phishing
Payloads
hashtag
References
List of resources for phishing payloads
Make phishing great again. VSTO office files are the new macro nightmare?
Medium
chevron-right
GitHub - Octoberfest7/XLL_Phishing: XLL Phishing Tradecraft
GitHub
chevron-right
Previous
Leveraging AI During Template Creation
chevron-left
Next
Non-malicious Callback
chevron-right
Last updated
3 years ago
sun-bright
desktop
moon
sun-bright
desktop
moon