gophish / user-guideLinks
A guide explaining how to use Gophish
☆39Updated 3 years ago
Alternatives and similar repositories for user-guide
Users that are interested in user-guide are comparing it to the libraries listed below
Sorting:
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 6 months ago
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 3 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 7 years ago
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆164Updated 2 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆163Updated 5 years ago
- Python script wrote to automate the process of generating various reverse shells.☆201Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- automated password spraying tool☆147Updated 4 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆132Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 3 months ago
- NessusV2 File Parser☆66Updated 3 years ago
- ☆54Updated 7 years ago
- ☆154Updated last month
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- A WLAN red team framework.☆155Updated last year
- Wavestone's web interface for password cracking with hashcat☆172Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago