gophish / user-guideLinks
A guide explaining how to use Gophish
☆39Updated 3 years ago
Alternatives and similar repositories for user-guide
Users that are interested in user-guide are comparing it to the libraries listed below
Sorting:
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆68Updated 7 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated this week
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Offensive Security / Pentesting Cheat Sheets☆103Updated 7 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 5 months ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- Converts Nmap XML output to csv file, and other useful functions☆219Updated last year
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Collection of scripts & fingerprinting tricks for Shodan.io☆257Updated 5 years ago
- Python script wrote to automate the process of generating various reverse shells.☆201Updated this week
- ☆155Updated last month
- A WLAN red team framework.☆155Updated last year
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 3 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆169Updated last week
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆48Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 5 years ago
- automated password spraying tool☆147Updated 4 years ago