codewatchorg / gophish
GoPhish is a phishing script that enables rapid deployment of phishing sites.
☆30Updated 6 years ago
Alternatives and similar repositories for gophish:
Users that are interested in gophish are comparing it to the libraries listed below
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 3 months ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Collection of Nmap scripts☆10Updated 9 years ago
- BurpJDSer-ng☆27Updated 2 weeks ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- Pentesting Tools☆21Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 12 years ago