cisagov / gophish-docker
Docker container for the gophish phishing framework.
☆51Updated 2 weeks ago
Alternatives and similar repositories for gophish-docker:
Users that are interested in gophish-docker are comparing it to the libraries listed below
- Helpful tools for interacting with a GoPhish phishing instance☆45Updated this week
- nmap scripts (nse files) to identify vulnerabilities☆31Updated last week
- A basic flask based Outlook Web Honey pot☆65Updated last year
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆42Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆40Updated last month
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- OpenBAS Docker deployment helpers☆18Updated this week
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 4 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆54Updated last month
- ☆80Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 3 years ago
- Phishing campaign docker composition for Gophish☆40Updated this week
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆69Updated 4 months ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆36Updated 9 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆111Updated 10 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆33Updated 5 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆48Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago