Examples for Gophish templates.
☆16May 19, 2023Updated 2 years ago
Alternatives and similar repositories for My-Gophish-Templates
Users that are interested in My-Gophish-Templates are comparing it to the libraries listed below
Sorting:
- ☆11Oct 16, 2025Updated 5 months ago
- Templates for an open-source Phishing Toolkit☆25Feb 8, 2023Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- Common User Password Profiler☆13Aug 20, 2025Updated 7 months ago
- Phishing Templates☆16Jan 13, 2021Updated 5 years ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆24Mar 13, 2026Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆26Jan 6, 2025Updated last year
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)☆12Jan 15, 2024Updated 2 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Nov 14, 2017Updated 8 years ago
- Collection of GoPhish templates available for legitimate usage.☆168May 16, 2023Updated 2 years ago
- An obfuscated file system that stores files and directories on Twitter. (Proof of concept.)☆27Sep 6, 2011Updated 14 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- DNSSECChef: DNS/DNSSEC Interception Proxy☆37Mar 29, 2019Updated 6 years ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Updated this week
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- mloptimizer is an optimizing library designed to be used with sklearn interface machine learning algorithms. It uses deap library for gen…☆14Feb 20, 2026Updated last month
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- ☆23Mar 2, 2026Updated 2 weeks ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆210Jun 14, 2024Updated last year
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆52Feb 22, 2026Updated 3 weeks ago
- ☆17Apr 5, 2021Updated 4 years ago
- Python passive host discovery script☆11Mar 30, 2025Updated 11 months ago
- ☆16Jul 20, 2025Updated 8 months ago
- A pipeline for ingesting Jumpcloud directory events into Wazuh☆18May 8, 2024Updated last year
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- PMKID Attack Module for the WiFi Pineapple☆17Jul 14, 2023Updated 2 years ago
- A Windows disk dumper☆24Nov 12, 2015Updated 10 years ago
- DFIR project to collect and analyze events in Google Workspace☆13Apr 12, 2024Updated last year
- Application Security pipelines☆51May 25, 2022Updated 3 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆37Jul 27, 2024Updated last year