Open-Source Phishing Toolkit
☆284Jul 16, 2025Updated 9 months ago
Alternatives and similar repositories for gophish
Users that are interested in gophish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆557Jun 3, 2025Updated 10 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Havoc C2 profile generator☆108Mar 4, 2026Updated last month
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- ☆20Dec 20, 2023Updated 2 years ago
- evilginx3 + gophish☆1,988Jun 15, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆443May 29, 2024Updated last year
- Hiding GoPhish from the boys in blue☆204Dec 6, 2022Updated 3 years ago
- ☆13Mar 1, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆162Apr 16, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Jun 9, 2024Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated 2 years ago
- This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifical…☆707May 27, 2025Updated 11 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆67Jan 10, 2025Updated last year
- Easily obfuscate your html!☆100Apr 7, 2024Updated 2 years ago
- Modified Version of Evilginx ( Telegram Notifications )☆43Feb 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆25Updated this week
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,277Apr 9, 2026Updated 2 weeks ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,058Feb 18, 2026Updated 2 months ago
- A Trading bot designed to trade top gaining or top losing assets based on CoinGecko API. Uses python and the Binance API to place orders.☆15Jan 20, 2025Updated last year
- [NEW] : Simple Mail Transfer Protocol (SMTP) CHECKER - CRACKER Tool V5☆13Sep 13, 2023Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆256Nov 24, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,141Jun 10, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- An offensive data enrichment pipeline☆956Apr 14, 2026Updated 2 weeks ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- ☆28Sep 18, 2023Updated 2 years ago
- Ready to go Phishing Platform☆1,130May 6, 2025Updated 11 months ago