cisagov / gophish-docker
Docker container for the gophish phishing framework.
☆46Updated this week
Alternatives and similar repositories for gophish-docker:
Users that are interested in gophish-docker are comparing it to the libraries listed below
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated last week
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- ☆79Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆36Updated 2 weeks ago
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- A basic flask based Outlook Web Honey pot☆66Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Phishing campaign docker composition for Gophish☆38Updated last week
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 3 months ago
- nmap scripts (nse files) to identify vulnerabilities☆30Updated last week
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆23Updated 2 years ago
- URL fingerprinting made easy☆85Updated 10 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 4 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 8 months ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆97Updated 7 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated 2 years ago
- WordPress version identification and vulnerability finder.☆30Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- ☆34Updated last year
- Commands used in Windows penetration tests☆50Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Citrix Scanner for CVE-2023-3519☆49Updated last year