cisagov / pca-gophish-compositionView external linksLinks
Phishing campaign docker composition for Gophish
☆45Jan 8, 2026Updated last month
Alternatives and similar repositories for pca-gophish-composition
Users that are interested in pca-gophish-composition are comparing it to the libraries listed below
Sorting:
- Helpful tools for interacting with a GoPhish phishing instance☆49Feb 3, 2026Updated last week
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆14Jan 31, 2021Updated 5 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆18Apr 22, 2024Updated last year
- Docker container for the gophish phishing framework.☆52Jan 7, 2026Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- Adversary Simulation Framework☆39Aug 19, 2025Updated 5 months ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Apr 5, 2024Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- ☆20Dec 20, 2023Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Docker container with a postfix server designed for use during phishing campaigns☆65Jan 7, 2026Updated last month
- Lure - User Recon Automation for GoPhish☆167Jul 30, 2023Updated 2 years ago
- Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional…☆12Feb 5, 2025Updated last year
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- Cobalt Strike User Defined Reflective Loader (UDRL). Check branches for different functionality.☆152Jul 20, 2022Updated 3 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Dec 26, 2025Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Kerberoast Detection Script☆31Oct 31, 2024Updated last year
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 10 months ago
- Bypass Medium paywalls on mobile. Paste or share a link to read instantly.☆31Oct 28, 2025Updated 3 months ago
- Fast IP Changer for any Huawei 3G/4G modems☆11Feb 19, 2020Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- ☆11Jun 28, 2022Updated 3 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- Fast Bug Bounty Script☆39Jan 15, 2025Updated last year