gophish / user-guideLinks
A guide explaining how to use Gophish
☆40Updated 2 years ago
Alternatives and similar repositories for user-guide
Users that are interested in user-guide are comparing it to the libraries listed below
Sorting:
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Automated Tools Pentest☆7Updated 2 years ago
- Offensive Security / Pentesting Cheat Sheets☆99Updated 6 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- One line PS scripts that may come handy during your network assesment☆78Updated 5 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- ☆150Updated last year
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- Parse .nessus file(s) and shows output in interactive UI☆152Updated last month
- Brute-force Cisco SSL VPN☆57Updated 5 years ago
- ☆24Updated 5 years ago
- ☆60Updated 7 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆95Updated 3 years ago
- Customized Kali Linux - Ansible playbook☆63Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Payloads to be used with Burp Suite Intruder. (Originally found on swisskeyrepo-PayloadsAllTheThings)☆81Updated 4 years ago
- Various scripts and codes☆84Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- Repo with various Red Team scripts☆145Updated 4 years ago
- Fully-featured spear-phishing toolkit - web front-end☆51Updated 4 months ago