In this repository is list of common keywords used when customizing domains, lures, URLs for live security engagements
Picking familiar everyday keywords that a user is used to seeing in their email tend to work well when masquerading your campaign
Along with valid certificates, it makes it more difficult to detect if this email is a malicious email or not
The tools here are intended solely for legal and ethical use by cybersecurity professionals in controlled environments. Any illegal or malicious use is strictly prohibited. I disclaim all responsibility for any harm, loss, or damage that may arise from improper use.