kgretzky / gophish
Open-Source Phishing Toolkit
☆99Updated last month
Related projects ⓘ
Alternatives and complementary repositories for gophish
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆85Updated 4 months ago
- sturdy-chainsaw☆52Updated last year
- Evilginx Phishing Engagement Infrastructure Setup Guide☆301Updated last month
- ☆275Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆72Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 5 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆158Updated 8 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- PowerShell Obfuscator☆89Updated 5 months ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆67Updated 3 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆349Updated 5 months ago
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆76Updated 2 months ago
- ☆58Updated 6 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- A C2 framework built for my bachelors thesis☆53Updated 2 weeks ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆91Updated 8 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆94Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆158Updated 5 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- Find Email Spoofing Vulnerablity of domains☆92Updated 3 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆210Updated 2 months ago