Helpful tools for interacting with a GoPhish phishing instance
☆48Feb 3, 2026Updated last month
Alternatives and similar repositories for gophish-tools
Users that are interested in gophish-tools are comparing it to the libraries listed below
Sorting:
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Phishing campaign docker composition for Gophish☆44Jan 8, 2026Updated 2 months ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 3 months ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated 2 weeks ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- A skeleton project for quickly getting a new cisagov Python library started.☆30Mar 2, 2026Updated last week
- ☆18Jun 25, 2024Updated last year
- A very vulnerable implementation of a GraphQL API.☆17Feb 12, 2026Updated 3 weeks ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆18Sep 24, 2024Updated last year
- Lure - User Recon Automation for GoPhish☆165Jul 30, 2023Updated 2 years ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last week
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆87Oct 27, 2022Updated 3 years ago
- MCP server for AdaptixC2☆27Jul 20, 2025Updated 7 months ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- DefectDojo Documentation☆17Oct 10, 2021Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 27, 2026Updated last week
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- ☆18Jul 14, 2021Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 8 months ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- A Python script to parse Fortinet products serial numbers, and detect the associated model and revision.☆19Oct 1, 2023Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46May 9, 2022Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago