2 Components & Libraries
Sortby
The following diagram shows how ThePhish works at high-level: This example aims to demonstrate how a user can send an email to ThePhish for it to be analyzed and how an analyst can actually analyze t…
A heavily armed customizable phishing tool for educational purpose only. It contains phishing email templates of mostly used social media platforms. I have made 3 youtube videos, they delete it, so i…
Subscribe to our newsletter