cisagov / gophish-dockerLinks
Docker container for the gophish phishing framework.
☆52Updated this week
Alternatives and similar repositories for gophish-docker
Users that are interested in gophish-docker are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- nmap scripts (nse files) to identify vulnerabilities☆29Updated last month
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated last month
- Traps web spiders☆76Updated 5 years ago
- Phishing campaign docker composition for Gophish☆42Updated this week
- Wazuh integration TheHive☆39Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 2 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- A WLAN red team framework.☆154Updated last year
- OpenAEV Docker deployment helpers☆23Updated this week
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 3 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 8 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 9 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- ☆80Updated 2 years ago
- An open-source self-hosted purple team management web application.☆290Updated last month
- Collection of useful Canary tools☆91Updated 2 months ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- ☆38Updated 10 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- ☆59Updated this week
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago