cisagov / gophish-tools
Helpful tools for interacting with a GoPhish phishing instance
☆45Updated 3 weeks ago
Alternatives and similar repositories for gophish-tools
Users that are interested in gophish-tools are comparing it to the libraries listed below
Sorting:
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Phishing campaign docker composition for Gophish☆40Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆48Updated 2 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- ☆33Updated 3 months ago
- ☆29Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Virtual Security Operations Center☆50Updated last year
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 6 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆27Updated 3 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- ☆36Updated 3 years ago
- Docker container for the gophish phishing framework.☆51Updated last month
- nse script to inject jndi payloads☆46Updated 3 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 7 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Microsoft Azure Exploitation Framework☆56Updated 3 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago