notdodo / docker-sneaky-gophishLinks
Docker for the latest gophish with stealth configuration from sneaky_gophish
☆17Updated last year
Alternatives and similar repositories for docker-sneaky-gophish
Users that are interested in docker-sneaky-gophish are comparing it to the libraries listed below
Sorting:
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Updated 4 years ago
- Phishing campaign docker composition for Gophish☆42Updated last week
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- A VS Code extension to preview XML nmap output☆44Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Notification webhook for GoPhish☆54Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 4 years ago
- wordlists for password cracking☆28Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 7 months ago
- Ansible role that Installs Mythic☆18Updated last year
- My Python Cookiecutter project template☆31Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆43Updated 9 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- ☆10Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago