notdodo / docker-sneaky-gophish
Docker for the latest gophish with stealth configuration from sneaky_gophish
☆16Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for docker-sneaky-gophish
- Phishing campaign docker composition for Gophish☆36Updated last month
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆15Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆35Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated last year
- ☆41Updated 7 months ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Updated 2 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- C# User Simulation☆33Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Continuous kerberoast monitor☆43Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated this week
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆14Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆42Updated 2 years ago
- A few XDR Scripts☆16Updated last month
- nmap scripts (nse files) to identify vulnerabilities☆27Updated last week
- Post-exploitation tool☆26Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆12Updated 3 months ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Powershell script to emulate the "blast radius" of a ransomware infection.☆26Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆12Updated 3 years ago
- ☆19Updated 3 years ago