cisagov / gophish-docker
Docker container for the gophish phishing framework.
☆47Updated last month
Alternatives and similar repositories for gophish-docker:
Users that are interested in gophish-docker are comparing it to the libraries listed below
- Helpful tools for interacting with a GoPhish phishing instance☆43Updated 3 weeks ago
- nmap scripts (nse files) to identify vulnerabilities☆30Updated last week
- A basic flask based Outlook Web Honey pot☆65Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- Phishing campaign docker composition for Gophish☆39Updated this week
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆52Updated 3 weeks ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆38Updated last week
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆38Updated 3 months ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆41Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- ☆34Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated 3 months ago
- ☆80Updated last year
- Citrix Scanner for CVE-2023-3519☆50Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 5 months ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆26Updated 2 weeks ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- Commands used in Windows penetration tests☆50Updated 3 years ago
- OpenBAS Docker deployment helpers☆18Updated this week
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago