gophish / user-guideLinks
A guide explaining how to use Gophish
☆39Updated 3 years ago
Alternatives and similar repositories for user-guide
Users that are interested in user-guide are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Offensive Security / Pentesting Cheat Sheets☆101Updated 7 years ago
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- Parse .nessus file(s) and shows output in interactive UI☆160Updated 6 months ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 2 years ago
- ☆153Updated 2 weeks ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆255Updated 5 years ago
- Automate Metasploit scanning and exploitation☆116Updated 3 months ago
- small python3 tool to check common vulnerabilities in SMTP servers☆164Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- automated password spraying tool☆147Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 2 months ago
- Enumerate a target Based off of Nmap Results☆78Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago
- NessusV2 File Parser☆66Updated 3 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Python script wrote to automate the process of generating various reverse shells.☆201Updated 4 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆57Updated last year
- Automated Penetration Testing Framework☆35Updated 6 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 7 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago