cisagov / pca-gophish-composition
Phishing campaign docker composition for Gophish
☆39Updated this week
Alternatives and similar repositories for pca-gophish-composition:
Users that are interested in pca-gophish-composition are comparing it to the libraries listed below
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- ☆41Updated 11 months ago
- ☆19Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Manticore Adversary Emulation Cli☆47Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated this week
- Helpful tools for interacting with a GoPhish phishing instance☆43Updated 3 weeks ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 4 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Updated 11 months ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆18Updated 4 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- My Python Cookiecutter project template☆31Updated 2 years ago
- Red team oriented key finder and correlator☆16Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 3 years ago
- ☆15Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- General scripts that gather information out of Active Directory☆16Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago