Docker container for the gophish phishing framework.
☆54Feb 18, 2026Updated last month
Alternatives and similar repositories for gophish-docker
Users that are interested in gophish-docker are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated last month
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- Create machine images containing the Nessus vulnerability scanner☆13Mar 13, 2026Updated last week
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- The web UI for the OpenRMF tool, which uses multiple containers for parts of the distributed openRMF tool for managing DoD STIG checklist…☆31Dec 2, 2025Updated 3 months ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆210Jun 14, 2024Updated last year
- [Stopped] A static site generator based on Emacs Org-mode.☆27Sep 30, 2016Updated 9 years ago
- ☆21Aug 13, 2025Updated 7 months ago
- ☆17Oct 26, 2021Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Mar 12, 2026Updated last week
- ☆14Mar 19, 2024Updated 2 years ago
- Play the classic roguelike game BrogueCE in your Kubernetes cluster with a controller acting as the dungeon master to validate and mutate…☆18Mar 24, 2025Updated 11 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- NIST transition-edge sensor (TES) data acquisition framework☆16Mar 14, 2026Updated last week
- A set of guidelines and best practices for an awesome engineering team☆270Feb 25, 2026Updated 3 weeks ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 3 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 4 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- 👈 lightning-fast cd and command execution☆11Sep 27, 2025Updated 5 months ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Mar 13, 2026Updated last week
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- ☆14Jul 12, 2025Updated 8 months ago
- Request for Comments focused on Hathor Network☆11Updated this week
- PIP Manager written in python Tkinter☆13Jul 19, 2024Updated last year
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 11 months ago
- ☆11Dec 31, 2018Updated 7 years ago
- Examples presented to classes of Code Louisville☆21Mar 11, 2022Updated 4 years ago
- ☆19Jul 16, 2023Updated 2 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- De Bruijn Sequence WAV File Generator for the HackRF☆14Jan 11, 2023Updated 3 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- ☆10Sep 20, 2022Updated 3 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago