01Guidelines for technical defenses including SPF, DKIM, and DMARC verification
0210 GitHub stars
03Templates for crafting convincing social engineering pretexts
04Step-by-step guides for Shellphish credential harvesting templates
05WiFi phishing (Evil Twin) attack workflows with Wifiphisher
06Reporting frameworks for security awareness and vulnerability assessments