nmanzi / throwphishLinks
Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.
☆17Updated 4 years ago
Alternatives and similar repositories for throwphish
Users that are interested in throwphish are comparing it to the libraries listed below
Sorting:
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- My Python Cookiecutter project template☆31Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Phishing campaign docker composition for Gophish☆42Updated last week
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆43Updated 9 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- Scripts and One-Liners☆22Updated 6 months ago
- Ansible role that Installs Mythic☆18Updated last year
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 4 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆17Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last week
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago