🎣 Open-Source Phishing Toolkit
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
Jordan Wright 0d57a78b74 Adding first draft of CONTRIBUTING file and CLA. Fixes #57 5 years ago
auth Caused API key to be generated dynamically for admin user. Fixes #60 5 years ago
config Updated dashboard diagrams 7 years ago
controllers Update bcrypt dependency and code moved to gophish group 5 years ago
doc Adding first draft of CONTRIBUTING file and CLA. Fixes #57 5 years ago
middleware Update bcrypt dependency and code moved to gophish group 5 years ago
models Added test for #60 5 years ago
static Added "Add Tracking Image" checkbox to template modal 5 years ago
templates Added "Add Tracking Image" checkbox to template modal 5 years ago
util Update bcrypt dependency and code moved to gophish group 5 years ago
worker Update bcrypt dependency and code moved to gophish group 5 years ago
.gitattributes Fixed csv upload on user import 6 years ago
.gitignore Working on setting up Login functionality 7 years ago
.travis.yml Bumped Go version requirement to v1.5 or above 5 years ago
CONTRIBUTING.md Adding first draft of CONTRIBUTING file and CLA. Fixes #57 5 years ago
LICENSE Updated copyright 5 years ago
README.md Updated README 5 years ago
config.json Added http handler for phishing endpoint - Will add content soon 7 years ago
gophish.go Update bcrypt dependency and code moved to gophish group 5 years ago

README.md

gophish logo

gophish

Build Status

Open-Source Phishing Toolkit

Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.

###Current Status Update 01/12/2016

The website is live! This website will contain all the documentation and updates for gophish activity.

Gophish is almost ready for its alpha release, and release 0.1 has been tagged! Just cleaning up some documentation and building the binary releases now. Expect a release announcement next week.

###Install

Installation of gophish is dead-simple - once the binaries are released (coming soon!), just download and extract the zip, and run the binary. Gophish will have binary releases for all platforms.

Building From Source

If you are building from source, please note that Gophish requires Go v1.5 or above!

To build gophish from source, simply run go get github.com/gophish/gophish followed by go build. You should have a binary called gophish in the current directory.

###Setup After running the gophish binary, open an Internet browser to http://localhost:3333 and login with the default username (admin) and password (gophish).

###Documentation

Documentation can be found on our site. Find something missing? Let us know by filing an issue!

###Issues

Find a bug? Want more features? Find something missing in the documentation? Let us know! Please don't hesitate to file an issue and we'll get right on it.

###License

gophish - Open-Source Phishing Framework

The MIT License (MIT)

Copyright (c) 2013 - 2016 Jordan Wright

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software ("Gophish Community Edition") and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.