gophish / user-guideLinks
A guide explaining how to use Gophish
☆39Updated 3 years ago
Alternatives and similar repositories for user-guide
Users that are interested in user-guide are comparing it to the libraries listed below
Sorting:
- Perform automated network reconnaissance scans☆238Updated 2 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 7 months ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆66Updated 7 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆163Updated 2 years ago
- ☆154Updated 2 weeks ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆255Updated 5 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- Python script wrote to automate the process of generating various reverse shells.☆201Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 5 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆169Updated 3 years ago
- A WLAN red team framework.☆154Updated last year
- Complete Automated pentest framework for Servers and Web Application Security☆38Updated 6 years ago
- Converts Nmap XML output to csv file, and other useful functions☆219Updated last year
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- automated password spraying tool☆147Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆95Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Converts Nmap XML output to csv file, and other useful functions☆94Updated 2 years ago