cisagov / pca-gophish-compositionLinks
Phishing campaign docker composition for Gophish
☆42Updated last week
Alternatives and similar repositories for pca-gophish-composition
Users that are interested in pca-gophish-composition are comparing it to the libraries listed below
Sorting:
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆19Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- ☆42Updated last year
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Updated 4 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆47Updated last week
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- ☆15Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- General scripts that gather information out of Active Directory☆16Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- Dynamic Labs is an open source tool aimed at red teamers and pentesters for the quick deployment of flexible, transient and cloud-hosted …☆61Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 8 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago