notdodo / docker-sneaky-gophish
Docker for the latest gophish with stealth configuration from sneaky_gophish
☆16Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for docker-sneaky-gophish
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆15Updated 3 years ago
- Phishing campaign docker composition for Gophish☆36Updated 2 months ago
- Script to test NetSec capabilities.☆21Updated last year
- Kibana app for RedELK☆16Updated last year
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- ☆17Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- ☆10Updated 3 months ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- A few XDR Scripts☆16Updated last month
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Manticore Adversary Emulation Cli☆46Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆12Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆42Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆26Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆42Updated last month
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 7 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year