Open-Source Phishing Toolkit
☆286Jul 16, 2025Updated 10 months ago
Alternatives and similar repositories for gophish
Users that are interested in gophish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,080Oct 6, 2025Updated 7 months ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆563Jun 3, 2025Updated 11 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆27Feb 27, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Havoc C2 profile generator☆110Mar 4, 2026Updated 2 months ago
- ☆20Dec 20, 2023Updated 2 years ago
- evilginx3 + gophish☆1,990Jun 15, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆444May 29, 2024Updated last year
- Hiding GoPhish from the boys in blue☆206Dec 6, 2022Updated 3 years ago
- ☆13Mar 1, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆163Apr 16, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifical…☆717May 27, 2025Updated 11 months ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Jun 9, 2024Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated 2 years ago
- Easily obfuscate your html!☆100Apr 7, 2024Updated 2 years ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆70Jan 10, 2025Updated last year
- Unified repository for different Metasploit Framework payloads☆23Oct 25, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆27Updated this week
- Modified Version of Evilginx ( Telegram Notifications )☆44Feb 25, 2026Updated 2 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆13Oct 31, 2023Updated 2 years ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,284Apr 9, 2026Updated last month
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,057Feb 18, 2026Updated 3 months ago
- A Trading bot designed to trade top gaining or top losing assets based on CoinGecko API. Uses python and the Binance API to place orders.☆15Jan 20, 2025Updated last year
- [NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V5☆13Sep 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆259Nov 24, 2025Updated 5 months ago
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,146Jun 10, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- An offensive data enrichment pipeline☆958May 2, 2026Updated 2 weeks ago
- ☆27Sep 18, 2023Updated 2 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 3 months ago