cisagov / gophish-toolsLinks
Helpful tools for interacting with a GoPhish phishing instance
☆47Updated last week
Alternatives and similar repositories for gophish-tools
Users that are interested in gophish-tools are comparing it to the libraries listed below
Sorting:
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- ☆29Updated 4 years ago
- Phishing campaign docker composition for Gophish☆42Updated last week
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- ☆27Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆12Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- SANS Slingshot Linux Distribution☆51Updated 4 years ago
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆12Updated 4 years ago
- Wireless Pentesting Device☆21Updated 4 years ago
- ☆33Updated 4 months ago
- ☆19Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago