kgretzky / gophish
Open-Source Phishing Toolkit
☆166Updated 5 months ago
Alternatives and similar repositories for gophish:
Users that are interested in gophish are comparing it to the libraries listed below
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆376Updated 3 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆285Updated 9 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆391Updated 9 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆123Updated 8 months ago
- ☆286Updated 9 months ago
- ☆291Updated last year
- Browser streaming MITM proxy☆59Updated last year
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆647Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆241Updated 6 months ago
- ☆310Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- Search & Parse Password Leaks☆337Updated 5 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 10 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆92Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆467Updated 4 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆341Updated 2 weeks ago
- Discover and monitor internet assets using favicon hashes across search engines.☆164Updated 2 months ago
- Collection of GoPhish templates available for legitimate usage.☆150Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 8 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- sturdy-chainsaw☆57Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆126Updated 2 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 6 months ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆26Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- Ready to go Phishing Platform☆40Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year