Phishing Detection Evasion Techniques

A collection of phishing techniques used to evade detection.


Read the blog post

About this resource

This database is a collection of modern phishing detection evasion techniques, breaking down the methods that attackers are using at different stages of a phishing attack culminating in account takeover (i.e. stealing sessions, credentials, etc.). Each stage groups the techniques observed against a phase of activity that is designed to overcome a layer of security control — for example, the identification and blocking of malicious URLs, or analysing pages for malicious content.

Get involved

This is naturally a work in progress and we plan to add and update techniques where relevant, as attacks evolve. If you'd like to contribute, you can find the matrix here.

You might also like...

We previously released the SaaS Attacks matrix, a MITRE-inspired resource for red and blue teams helping them to move away from endpoint-centric thinking when it comes to running attack simulation exercises and testing security defenses.