Automation for GoPhish internal phishing campaigns.
☆20Jan 24, 2022Updated 4 years ago
Alternatives and similar repositories for dw-gophish-automation
Users that are interested in dw-gophish-automation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An addon to import users from active directory to gophish☆18Mar 22, 2022Updated 4 years ago
- Utility to copy templates, pages, and sending profiles between different Gophish accounts☆20Oct 28, 2020Updated 5 years ago
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 9 months ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆19Feb 15, 2024Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Python script to collect campaign data from Gophish and generate a report☆199Nov 15, 2022Updated 3 years ago
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 4 months ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆17Aug 30, 2025Updated 7 months ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 2 months ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- "Clone Repository" plugin for Acode allows you to clone Git repositories to your local machine, supporting authentication for private rep…☆20May 9, 2024Updated last year
- Cloudflare Zones Settings Automation using GitHub Actions☆26Updated this week
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A javascript library to convert Outlook *.msg files to *.eml☆11Jun 27, 2024Updated last year
- GoPhish Templates that I have retired and/or templates I've recreated.☆210Jun 14, 2024Updated last year
- ☆21Apr 14, 2026Updated 2 weeks ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- 🔗 Simplify and Supercharge Your Links!☆17Updated this week
- CVE-2023-26255_POC,CVE-2023-26256_POC☆32Aug 24, 2023Updated 2 years ago
- Useful OSINT tools for Discord☆24Jan 21, 2026Updated 3 months ago
- VS Code inspired text editor that mostly runs in a webworker☆11Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- IntelMQ Tutorial and Introductory Documentation☆15May 26, 2022Updated 3 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆19Nov 16, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 8 months ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated last year
- Files used in the development of an email phishing protection application in Microsoft's Office Outlook add-in environmnet☆16Jan 5, 2023Updated 3 years ago
- Query haveibeenpwned and store responses to detect which data breaches may pose the biggest threat to your organization.☆18May 4, 2022Updated 3 years ago
- Monthly summary email of Firefly III categories☆16Dec 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Msfvenom Advanced Obfuscated Payload Builder.☆32Jun 2, 2025Updated 10 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆86Mar 3, 2022Updated 4 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- 📝 Free and open-source software that automatically suggests citations and helps write a bibliography for you. Forked from zotero/bib-web…☆25Nov 28, 2025Updated 5 months ago
- Go library for doing domain fronting☆27Updated this week
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago