The current project contains every social fishing point.
Every subdirectory contains the recommended article and project, and partial implemented code.
The code in subdirectory has been tested compile successfully and function properly.
https://redsiege.com/blog/2024/04/sshishing-abusing-shortcut-files-and-the-windows-ssh-client-for-initial-access/
【红蓝对抗:钓鱼演练资源汇总&备忘录】https://github.com/tib36/PhishingBook
【实战|记一次企业钓鱼演练】https://mp.weixin.qq.com/s/4ilYuK7jbg5xfU2l3x1Sbw
【记一次钓鱼邮件演练】https://mp.weixin.qq.com/s/R5zvtEKvxQdXLpP4tI9opQ
【邮件钓鱼新思路】https://mp.weixin.qq.com/s/a4nqyKPzACYbsJAIqDrgow
【干货 | 红队渗透中钓鱼tips总结】https://mp.weixin.qq.com/s/RDvakryfe_5oQ656AVIJsA
【钓鱼邮件(上)】https://mp.weixin.qq.com/s/YR6DFvDAP_gn96K3zaQtAQ
https://mp.weixin.qq.com/s/-sGRCSoOxP2a9aR0vNoZVw
https://www.cybereason.com/blog/threat-analysis-taking-shortcuts-using-lnk-files-for-initial-infection-and-persistence
https://github.com/Maldev-Academy/ExecutePeFromPngViaLNK
https://www.seqrite.com/blog/unmasking-the-svg-threat-how-hackers-use-vector-graphics-for-phishing-attacks/
【浅谈钓鱼捆绑技术--coleak】https://mp.weixin.qq.com/s/OrIb-yXj2wMd5LF9kAbjsw
【黑客(红队)攻防中内网利用chm文件进行getshell上线--Flowers aq】https://mp.weixin.qq.com/s/_bD_-MbNujn6P_y18xUk0g