cisagov / gophish-dockerLinks
Docker container for the gophish phishing framework.
☆52Updated last month
Alternatives and similar repositories for gophish-docker
Users that are interested in gophish-docker are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last month
- nmap scripts (nse files) to identify vulnerabilities☆29Updated 3 weeks ago
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- Phishing campaign docker composition for Gophish☆44Updated this week
- Traps web spiders☆76Updated 5 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 11 months ago
- OpenAEV Docker deployment helpers☆24Updated last week
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 4 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated last year
- A WLAN red team framework.☆155Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated last month
- ☆80Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 2 months ago
- Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelto…☆44Updated last year
- ☆34Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆46Updated 11 months ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆41Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year