
Gophish - Open Source Phishing Framework
Gophish makes it easy to create or import pixel-perfect phishing templates. Our web UI includes a full HTML editor, making it easy to customize your templates right in your browser.
Gophish: Open-Source Phishing Toolkit - GitHub
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and …
GoPhish for Professionals: A Complete Technical Guide to Ethical …
Aug 6, 2025 · Gophish is an open-source framework that enables launching phishing campaigns. This framework helps organisations assess their employee’s training effectiveness to …
Installation | Gophish User Guide
Gophish is provided as a pre-built binary for most operating systems. With this being the case, installation is as simple as downloading the ZIP file containing the binary that is built for your …
How to Set Up and Run a Phishing Campaign with GoPhish
Feb 21, 2025 · GoPhish is an open-source phishing framework that makes it easy to create, send, and track phishing emails.
Documentation - Gophish
Documentation User Guide Learn how to install, configure, and use Gophish to test your organization's exposure to phishing.
Gophish: The Ultimate Open-Source Phishing Framework for …
Mar 11, 2025 · What is Gophish? Gophish is an open-source phishing framework that enables organizations to conduct phishing simulations and security awareness training. It’s designed to …
GoPhish - Home
What is Go Phish!? Go Phish! is a virtual phishing simulator that allows users to practice identifying phishing and non-phishing emails in a simulated inbox accessible via their desktop …
GitHub - GottaPhish/gophish-ByGottaPhish: Open-Source …
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and …
Releases · gophish/gophish - GitHub
Sep 14, 2022 · When you configure a webhook, Gophish will make (optionally signed) HTTP requests to an endpoint you control. These requests include the JSON body of the event that …