cisagov / gophish-toolsLinks
Helpful tools for interacting with a GoPhish phishing instance
☆48Updated last week
Alternatives and similar repositories for gophish-tools
Users that are interested in gophish-tools are comparing it to the libraries listed below
Sorting:
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆12Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- ☆29Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Phishing campaign docker composition for Gophish☆42Updated last week
- Wireless Pentesting Device☆22Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 4 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆27Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆21Updated 3 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Protocol agnostic online password guessing API.☆82Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 3 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- scripts to setup environments for red/blue teams.☆16Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- LEQL examples for Rapid7 SIEM☆9Updated 4 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago