Gophish with Malicious Attachment and HTTP redirect support
☆13Dec 11, 2023Updated 2 years ago
Alternatives and similar repositories for gophish
Users that are interested in gophish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 7 months ago
- NetGaze is a powerful yet lightweight tool designed to capture and analyze network traffic on Android devices without requiring root acce…☆17Mar 28, 2025Updated last year
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Remote Access Tool written in VBNET☆17Sep 8, 2020Updated 5 years ago
- ☆14Sep 25, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- OSSEC HIDS - Sucuri Fork☆11Feb 12, 2021Updated 5 years ago
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- daemon for PolySwarm, the first decentralized threat intelligence market.☆14Mar 25, 2021Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Nov 14, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Generate Professional Phishing Emails Templates Fast And Easy☆14May 2, 2020Updated 5 years ago
- Better user subscriptions for your Flarum forum☆13Mar 25, 2026Updated 3 weeks ago
- ioc2rpz webgui☆17Feb 13, 2026Updated 2 months ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆30Mar 18, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Aug 7, 2014Updated 11 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Priss is a CSS print framework that ensures that your web pages are nice and readable when printed.☆32Mar 31, 2010Updated 16 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Detecting attack tool for HTTP server such as Apache and Nginx.☆10Dec 22, 2013Updated 12 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆25Oct 2, 2020Updated 5 years ago
- One-shot face animation using webcam, capable of running in real time.☆41May 23, 2024Updated last year
- ☆20Apr 21, 2020Updated 5 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago