goblin

Phishing simulator

A tool for simulating phishing attacks in red teaming exercises.

一款适用于红蓝对抗中的仿真钓鱼系统

GitHub

1k stars
17 watching
204 forks
Language: Go
last commit: over 1 year ago
blueteamcybersecuritygoblingolang-toolshoneypotsphishingredteamredteam-toolssecuritysecurity-tools

Related projects:

Repository Description Stars
gemgeorge/sniperphish A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. 540
pentestgeek/phishing-frenzy A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities 794
zerofox-oss/phishpond A tool for analyzing phishing kits in a contained environment 43
sebastian-mora/awsssome_phish A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. 29
infosecn1nja/red-teaming-toolkit A collection of tools to simulate an adversary's actions and test security controls 9,116
curtbraz/phishapi A tool for creating and deploying fake web pages to steal credentials 372
mandiant/reelphish A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. 507
raikia/fiercephish A tool for managing phishing campaigns and simulating email attacks. 1,324
trycatchhcf/dumpsterfire A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training 997
omergunal/pot Automated phishing attack simulation tool 251
alteredsecurity/365-stealer A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. 453
muraenateam/muraena Automates interactions with targeted websites to mimic user behavior and gather data 927
redcanaryco/atomic-red-team A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. 9,811
mdsecactivebreach/o365-attack-toolkit A toolkit for simulating phishing attacks on Office 365 accounts 1,037
martabyte/red-team-ops A collection of tools and techniques for simulating cyber attacks on computer systems 19