kgretzky / gophish
Open-Source Phishing Toolkit
☆98Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for gophish
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆85Updated 4 months ago
- ☆275Updated last year
- Evilginx Phishing Engagement Infrastructure Setup Guide☆297Updated 3 weeks ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 3 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- sturdy-chainsaw☆52Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆71Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆157Updated 5 months ago
- A Slack bot phishing framework for Red Teaming exercises☆156Updated 6 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆158Updated 8 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆103Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆18Updated last year
- Collection of GoPhish templates available for legitimate usage.☆144Updated last year
- PowerShell Obfuscator☆87Updated 5 months ago
- A C2 framework built for my bachelors thesis☆53Updated last week
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 3 months ago
- Social Engineering Browser Update Attack.☆54Updated 11 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆344Updated 5 months ago
- ☆58Updated 6 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- ☆132Updated last year
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆108Updated 9 months ago
- Hiding GoPhish from the boys in blue☆171Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 9 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 5 months ago
- NetProbe: Network Probe☆149Updated 3 weeks ago
- Continuous password spraying tool☆116Updated 4 months ago
- ☆99Updated last month