gophish / user-guide
A guide explaining how to use Gophish
☆37Updated 2 years ago
Alternatives and similar repositories for user-guide:
Users that are interested in user-guide are comparing it to the libraries listed below
- Information-Gathering Shell Script☆29Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆84Updated 9 months ago
- Offensive Security / Pentesting Cheat Sheets☆97Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆77Updated 5 years ago
- recon-ng modules for Censys☆36Updated last year
- Enumerate a target Based off of Nmap Results☆77Updated last year
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆52Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- Brute-force Cisco SSL VPN☆57Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated last year
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- Fraud prevention tool☆28Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆64Updated 4 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆44Updated 3 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆55Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Automated Tools Pentest☆7Updated last year
- Scripts to set up Kali Linux with additional tools, and maintain them.☆58Updated last year
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆17Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- ☆19Updated 7 years ago
- A custom script I created because I got tired of installing my tools manually!☆16Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Updated 5 years ago
- ☆24Updated 4 years ago