gophish / gophishLinks
Open-Source Phishing Toolkit
☆12,891Updated 10 months ago
Alternatives and similar repositories for gophish
Users that are interested in gophish are comparing it to the libraries listed below
Sorting:
- Nikto web server scanner☆9,481Updated 2 weeks ago
- Open Source Vulnerability Management Platform☆5,772Updated last week
- Next generation web scanner☆5,975Updated last year
- The Browser Exploitation Framework Project☆10,339Updated last week
- Phishing Campaign Toolkit☆2,419Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,127Updated 5 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,319Updated 3 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,351Updated last week
- Attack Surface Management Platform☆8,912Updated last month
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,353Updated 10 months ago
- In-depth attack surface mapping and asset discovery☆13,288Updated last week
- E-mails, subdomains and names Harvester - OSINT☆13,081Updated this week
- Advanced vulnerability scanning with Nmap NSE☆3,643Updated 10 months ago
- NSE script based on Vulners.com API☆3,327Updated 2 months ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆12,148Updated 9 months ago
- Adversary Emulation Framework☆9,699Updated last week
- Fast passive subdomain enumeration tool.☆12,007Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,453Updated 6 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,293Updated 10 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,701Updated 2 weeks ago
- A swiss army knife for pentesting networks☆8,836Updated last year
- Credentials recovery project☆10,249Updated 2 months ago
- Web application fuzzer☆6,235Updated 11 months ago
- Modlishka. Reverse Proxy.☆5,047Updated 2 months ago
- Malicious traffic detection system☆7,104Updated this week
- A Tool for Domain Flyovers☆5,810Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆10,494Updated 11 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,386Updated this week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,271Updated 3 months ago
- Directory/File, DNS and VHost busting tool written in Go☆12,236Updated this week