cisagov / gophish-tools
Helpful tools for interacting with a GoPhish phishing instance
☆42Updated 3 months ago
Alternatives and similar repositories for gophish-tools:
Users that are interested in gophish-tools are comparing it to the libraries listed below
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- ☆12Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆12Updated 10 months ago
- Phishing campaign docker composition for Gophish☆38Updated 4 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆46Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Docker container for the gophish phishing framework.☆46Updated last week
- Virtual Security Operations Center☆50Updated last year
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 2 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆12Updated 4 years ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆26Updated 3 years ago