conducting-spearphishing-simulation-campaign
Audited by Socket on Mar 16, 2026
3 alerts found:
SecurityMalwarex2This code is a spearphishing campaign toolkit (dual-use offensive tooling). It directly facilitates targeted phishing: creating personalized emails, embedding tracking pixels, and analyzing credential capture metrics. While the fragment lacks active obfuscation or explicit backdoor/ransomware behaviors, its purpose is malicious (or at least highly dangerous if misused). The provided file contains syntax errors that must be fixed for execution. Treat any inclusion of this module in dependencies as a high security risk — remove or isolate unless explicitly authorized for controlled red-team exercises with appropriate approvals and audit controls.
This document is a high-confidence malicious spearphishing playbook. It contains step-by-step instructions to create phishing infrastructure, craft convincing emails and landing pages to harvest credentials, deliver and execute malware payloads (HTML smuggling, macros, ISO/LNK chains), and evade defenses (SPF/DKIM/DMARC, SSL, typosquatting, obfuscation). It explicitly instructs capturing passwords and setting up C2/callbacks. This content should be treated as malicious operational guidance and not used in production; hosting or executing any of these steps would facilitate targeted compromise. Recommend immediate removal/blocking, reporting to relevant abuse channels, and further investigation of any artifacts or domains used.
This skill is not a benign red-team guide for constrained review; it explicitly enables AI-driven spearphishing, credential theft, MFA bypass, malicious payload delivery, and C2-enabled compromise. Its capabilities are fundamentally offensive and disproportionate to safe agent use, making it high risk and effectively malicious in purpose.