Open-Source Phishing Toolkit
☆20May 23, 2021Updated 4 years ago
Alternatives and similar repositories for gophish_mods
Users that are interested in gophish_mods are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hiding GoPhish from the boys in blue☆205Dec 6, 2022Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- A simple yet beautiful phishing proxy.☆59Aug 13, 2021Updated 4 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- A really fast http prober.☆40Feb 1, 2024Updated 2 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Backend for Nuclear Pond☆20Dec 7, 2023Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆143May 4, 2022Updated 4 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆18Sep 24, 2024Updated last year
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Simple Nmap XML parsing script. Doesn't do anything fancy☆22Oct 22, 2020Updated 5 years ago
- Tools for bug bounty☆29Jul 9, 2025Updated 9 months ago
- ☆25May 13, 2019Updated 6 years ago
- ☆53Apr 1, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code snippets from my blog☆29Oct 13, 2025Updated 6 months ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- .NET 4.0 WinRM API Command Execution☆165Sep 11, 2020Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated 3 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- A network scanning solution for information gathering in large IT/OT network environments.☆31Sep 15, 2025Updated 7 months ago