-
# Ethical Hacking 1
Description:
In the "Ethical Hacking - Phishing Email" lesson, I will harness the power of Kali Linux VM to delve into the world of social engineering through the Social Engineer…
-
-
### Have you contacted the Support Team already?
- [X] I have attempted already, but to no avail, or they pointed me here.
### What are the issues you need support with?
"A blocklist for blocking m…
-
**Describe the bug**
It seems that most of the lists are empty (except 3) i.e. https://github.com/mitchellkrogza/Phishing.Database/blob/master/phishing-domains-ACTIVE.txt
**To Reproduce**
Steps t…
-
#### Description of problem:
The rule descriptions are not up-to-date with the latest STIG.
For example, after the update of the [RHEL 9 STIG](https://github.com/ComplianceAsCode/content/commit/…
-
Hello! How can I add my custom html page in phishing site? @kgretzky
-
The so called "Deep Links" that are used by most current authentication solutions like BankID in Sweden, are in spite of secure key storage and PKI, susceptible to traditional phishing attacks for sim…
-
> The modal window approach improves security because the browser displays the payment handler origin, making phishing more difficult.
I'm hesitant to have the document say the above... we don't kn…
-
The phishing link has been invalid
-
Hi sir! I am participating in Hacktoberfest 2021!
I would like to contribute by adding Phishing tool. Please label it as hacktoberfest and assign it to me.
Thanks in advance sir.