cisagov / gophish-dockerLinks
Docker container for the gophish phishing framework.
☆52Updated 2 months ago
Alternatives and similar repositories for gophish-docker
Users that are interested in gophish-docker are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- nmap scripts (nse files) to identify vulnerabilities☆29Updated 2 weeks ago
- A basic flask based Outlook Web Honey pot☆68Updated 2 years ago
- Traps web spiders☆77Updated 5 years ago
- Shodan Monitoring integration for TheHive.☆131Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆41Updated 11 months ago
- Phishing campaign docker composition for Gophish☆44Updated last week
- A WLAN red team framework.☆154Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆50Updated 5 months ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆107Updated 2 months ago
- ☆80Updated 2 years ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- OpenAEV Docker deployment helpers☆26Updated last week
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 7 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆47Updated 11 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 2 years ago
- ☆53Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago
- ☆56Updated 10 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Collection of useful Canary tools☆91Updated 3 weeks ago
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆44Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year