mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	Updated phishing-HTML-linter.py
This commit is contained in:
		@@ -132,6 +132,8 @@ OUTPUT:
 | 
				
			|||||||
  - `<a href="..."> URL contained GET parameter with URL`
 | 
					  - `<a href="..."> URL contained GET parameter with URL`
 | 
				
			||||||
  - `<a href="..."> URL pointed to an executable file`
 | 
					  - `<a href="..."> URL pointed to an executable file`
 | 
				
			||||||
  - `Mail message contained suspicious words`
 | 
					  - `Mail message contained suspicious words`
 | 
				
			||||||
 | 
					  - `Mail message contained unsupported HTML tags`
 | 
				
			||||||
 | 
					  - `Mail message contained unsupported HTML attributes`
 | 
				
			||||||
  
 | 
					  
 | 
				
			||||||
  Such characteristics are known bad smells that will let your e-mail blocked.
 | 
					  Such characteristics are known bad smells that will let your e-mail blocked.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
 Submodule phishing/decode-spam-headers updated: 2eec0b5f47...a266b79ea1
									
								
							
							
								
								
									
										
											BIN
										
									
								
								red-teaming/Self-Signed Threat/MSKernel32Cloned.pfx
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								red-teaming/Self-Signed Threat/MSKernel32Cloned.pfx
									
									
									
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
		Reference in New Issue
	
	Block a user