cisagov / gophish-dockerLinks
Docker container for the gophish phishing framework.
☆52Updated this week
Alternatives and similar repositories for gophish-docker
Users that are interested in gophish-docker are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- A basic flask based Outlook Web Honey pot☆68Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆108Updated 2 months ago
- Traps web spiders☆77Updated 5 years ago
- nmap scripts (nse files) to identify vulnerabilities☆29Updated last month
- Phishing campaign docker composition for Gophish☆44Updated last week
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated this week
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆59Updated 8 months ago
- A WLAN red team framework.☆155Updated last year
- ☆80Updated 2 years ago
- Wappalyzer CLI tool to find Web Technologies☆61Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated 3 weeks ago
- OpenAEV Docker deployment helpers☆26Updated 2 weeks ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 11 months ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated last week
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- Gather information from an email address connected to Office 365☆88Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- URL fingerprinting made easy☆89Updated last year
- ☆34Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- Wazuh integration TheHive☆41Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago