Open-Source Phishing Toolkit
☆20May 23, 2021Updated 4 years ago
Alternatives and similar repositories for gophish_mods
Users that are interested in gophish_mods are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Many Evilginx2 Phishlets Uptodate☆58Dec 7, 2025Updated 3 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- A simple yet beautiful phishing proxy.☆58Aug 13, 2021Updated 4 years ago
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- Lateralus is terminal based phishing campaign tool☆28Feb 25, 2023Updated 3 years ago
- A really fast http prober.☆40Feb 1, 2024Updated 2 years ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆142May 4, 2022Updated 3 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆18Sep 24, 2024Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Tools for bug bounty☆29Jul 9, 2025Updated 8 months ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆21Oct 22, 2020Updated 5 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code snippets from my blog☆29Oct 13, 2025Updated 5 months ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Jan 27, 2026Updated 2 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago