An addon to import users from active directory to gophish
☆18Mar 22, 2022Updated 4 years ago
Alternatives and similar repositories for GoLDAP
Users that are interested in GoLDAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Utility to copy templates, pages, and sending profiles between different Gophish accounts☆19Oct 28, 2020Updated 5 years ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- A Python script to collect campaign data from Gophish and generate a report☆197Nov 15, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The documentation for the Gophish API☆38Apr 25, 2022Updated 3 years ago
- An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.☆52Feb 7, 2024Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Lure - User Recon Automation for GoPhish☆165Jul 30, 2023Updated 2 years ago
- Packer and Vagrant configurations for Kali Linux☆14Jun 26, 2021Updated 4 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- ☆11Mar 25, 2024Updated 2 years ago
- CanIBeSpoofed is a console project utilising functionality built for the https://caniphish.com/free-phishing-tools/email-spoofing-test we…☆46Jan 26, 2025Updated last year
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The Reverse Proxy keeps track of available servers, receives client data, forwards client data to servers with corresponding privacy poli…☆16May 19, 2021Updated 4 years ago
- A Terraform module for deploying a Talos cluster on vSphere☆17Apr 7, 2021Updated 5 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- This module allows you to deploy a Kubernetes cluster based on Talos OS in the vSphere infrastructure.☆22Jun 8, 2022Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 5 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 9 months ago
- Documentation on integrating Gitlab and Icinga2 configuration for CI / CD☆16May 9, 2018Updated 7 years ago
- VS Code inspired text editor that mostly runs in a webworker☆11Updated this week
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆60Jun 2, 2025Updated 10 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆87Apr 26, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Add information from CDP or LLDP to SCCM Hardware Inventory☆15May 14, 2021Updated 4 years ago
- A service to test mail servers for best practices.☆37Jul 3, 2018Updated 7 years ago
- Maltego with a twist of wireless☆26Jan 16, 2015Updated 11 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆69Mar 11, 2026Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆211Jun 14, 2024Updated last year
- ☆15Jan 26, 2023Updated 3 years ago