π£ Just released: GoPhish MCP Server!
β¨ Features:
π― Campaign management (CRUD + analytics)
π₯ Groups, templates, pages, SMTP profiles
π Advanced analytics & reporting
π Smart search & utilities
π£ Just released: GoPhish MCP Server!
β¨ Features:
π― Campaign management (CRUD + analytics)
π₯ Groups, templates, pages, SMTP profiles
π Advanced analytics & reporting
π Smart search & utilities
En esta oportunidad y con la gran escalada de #spam que hay en el mundo te traigo #gophish un framework opensource que permite crear campaΓ±as de phising para que las lances internamente en tu empresa, veas los resultados, generes informes y realices las acciones pertinentes como #capacitaciΓ³n al personal.
Miralo en: https://luiszambrana.ar/campanas-de-phishing-para-revision-de-seguridad-interna-de-tu-empresa/
Si te gusta nuestros post te agradezco que compartas!!
π― Threat Intelligence
======================
π οΈ Tool
Executive summary: A curated catalog of 100 n8n workflow ideas
targeting Red Team, Blue Team (SOC/DFIR/TI), AppSec/DevSecOps and
general platform security. Each entry maps a specific objective to
integrations and a node-level flow outline suitable for direct
implementation in n8n.
Technical scope and components: The collection spans reconnaissance
(subfinder, amass, DNSDB), active scanning (nmap, naabu, masscan),
telemetry enrichment (Shodan, Censys, GeoIP, AbuseIPDB), offensive
tooling orchestration (GoPhish, custom IdP for lab credential sprays),
artifact lifecycle (S3/TimescaleDB/PostgreSQL), and C2/event
forwarding (CS/Havoc/Sliver webhooks). Flows consistently use common
n8n primitives: Cron/Webhook triggers, Exec/HTTP request nodes,
IF/Switch logic, database upserts, and batching/merge nodes for scale.
Implementation considerations: Several ideas assume controlled lab
environments (credential spraying, EDR evasion tests, malicious macro
builders). The patterns emphasize separation of concerns:
scanning/extraction β enrichment β dedupe/persistence β alerting/issue
creation. Integrations call for credential handling via secret stores
and rate-limiting (delay/wait nodes) to avoid false positives and
service throttling.
Detection and defensive value: For Blue Team use-cases, flows include
automated ingestion of C2 events, decoy link tracking with GeoIP and
reputation scoring, exfiltration simulation to cloud storage for DLP
tuning, and continuous attack-surface change detection that creates
tickets for new/changed hosts or open ports. These provide repeatable
pipelines for measurement and tuning of SOC detections.
Operational risks and guardrails: Several recipes are explicitly
offensive and must remain confined to testbeds. Logging and artifact
management recommendations include hashing artifacts at ingest,
storing evidence in immutable buckets, and tagging DB records with
provenance to support IR workflows.
Concluding assessment: This collection is a practical playbook for
security teams seeking to automate repetitive reconnaissance, testing
and monitoring tasks using n8n. It lowers implementation friction by
providing ready-to-adapt node sequences and integration patterns.
πΉ n8n #automation #subfinder #gophish #bookmark
π Source: https://github.com/CyberSecurityUP/n8n-CyberSecurity-Workflows
Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks. - CyberSecurityUP/n8n-CyberSecurity-Workflows
Π£Π³Π½Π°ΡΡ Β«ΡΠ΅Π»Π΅Π³ΡΒ» Π·Π° 60 ΡΠ΅ΠΊΡΠ½Π΄: Π»Π°ΠΉΡΡ Π°ΠΊΠΈ ΠΏΠΎ ΠΏΡΠΎΡΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡΠ²ΠΈΡ ΠΌΠΎΡΠ΅Π½Π½ΠΈΠΊΠ°ΠΌ ΠΎΡ ΡΠΎΡΠΈΠ°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΈΠ½ΠΆΠ΅Π½Π΅ΡΠ°
ΠΡΠ΅ΠΌ ΠΏΡΠΈΠ²Π΅Ρ! ΠΠ° ΡΠ²ΡΠ·ΠΈ ΡΠ½ΠΎΠ²Π° Π―ΠΊΠΎΠ² Π€ΠΈΠ»Π΅Π²ΡΠΊΠΈΠΉ, ΡΠΊΡΠΏΠ΅ΡΡ ΠΏΠΎ ΡΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Angara Security, ΠΏΠΎΠ΄Π΅Π»ΠΈΠ»ΡΡ ΠΎΠΏΡΡΠΎΠΌ ΠΎΠ±ΡΠ΅Π½ΠΈΡ Ρ ΠΌΠΎΡΠ΅Π½Π½ΠΈΠΊΠ°ΠΌΠΈ Telegram ΠΎΡΡΠ°Π΅ΡΡΡ ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΡΠΈΡ ΠΎΡΠ½ΠΎΠ²Π½ΡΡ ΠΌΠ΅ΡΡΠ΅Π½Π΄ΠΆΠ΅ΡΠΎΠ², Π° Π°ΠΊΠΊΠ°ΡΠ½Ρ Π² Π½Π΅ΠΌ β ΡΠ°Π±ΠΎΡΠΈΠΌ ΠΈ ΡΠΎΡΠΈΠ°Π»ΡΠ½ΡΠΌ Π°ΠΊΡΠΈΠ²ΠΎΠΌ. Π£Π²Π΅ΡΠ΅Π½Ρ, ΡΡΠΎ ΡΠΌΠΎΠΆΠ΅ΡΠ΅ Π½Π΅ ΠΏΠΎΡΠ΅ΡΡΡΡ Π΅Π³ΠΎ ΠΏΡΠΈ Π°ΡΠ°ΠΊΠ΅ ΠΌΠΎΡΠ΅Π½Π½ΠΈΠΊΠΎΠ²? ΠΡΠ΅Π΄ΡΡΠ°Π²ΠΈΠΌ ΡΠ΅Π»ΠΎΠ²Π΅ΠΊΠ°, ΠΊΠΎΡΠΎΡΡΠΉ ΡΠ²Π΅ΡΠ΅Π½Π½Π΅Π΅ ΡΡΠ΅Π΄Π½Π΅Π³ΠΎ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΎΡΠΈΠ΅Π½ΡΠΈΡΡΠ΅ΡΡΡ Π² ΠΊΡΠΈΠΏΡΠ΅ ΠΈ ΡΠΈΡΡΠΎΠ²ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ. ΠΠ°ΡΠ° Π½Π΅Π²Π΅ΡΠ½ΡΡ Π΄Π΅ΠΉΡΡΠ²ΠΈΠΉ β ΠΈ Π΄Π°ΠΆΠ΅ ΠΎΠ½ ΡΠ΅ΡΡΠ΅Ρ Π΄ΠΎΡΡΡΠΏ ΠΊ ΡΠ²ΠΎΠ΅ΠΌΡ Π°ΠΊΠΊΠ°ΡΠ½ΡΡ. ΠΠΈΠ½ΡΡ Π°ΠΊΡΠΈΠ²Ρ, ΠΌΠΈΠ½ΡΡ Π°ΠΊΠΊΠ°ΡΠ½Ρ, Π° Ρ Π½ΠΈΠΌ β Π²ΡΠ΅ ΠΏΠ΅ΡΠ΅ΠΏΠΈΡΠΊΠΈ ΠΈ ΠΏΠΎΠ»ΠΎΠ²ΠΈΠ½Π° ΡΠ°Π±ΠΎΡΠ΅ΠΉ/ΡΠΎΡΠΈΠ°Π»ΡΠ½ΠΎΠΉ ΠΆΠΈΠ·Π½ΠΈ. Π―ΠΊΠΎΠ² Π€ΠΈΠ»Π΅Π²ΡΠΊΠΈΠΉ, ΡΠΊΡΠΏΠ΅ΡΡ ΠΏΠΎ ΡΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Angara Security, ΡΠ°ΡΡΠΊΠ°Π·ΡΠ²Π°Π΅Ρ, ΠΊΠ°ΠΊ Π²ΡΠ³Π»ΡΠ΄ΠΈΡ Β«ΡΠ³ΠΎΠ½ βΡΠ΅Π»Π΅Π³ΠΈβΒ» Ρ ΡΠΎΡΠΊΠΈ Π·ΡΠ΅Π½ΠΈΡ ΡΠΎΡΠΈΠ°Π»ΡΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅ΡΠΈΠΈ. ΠΠ°ΠΊ ΡΠΎΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ ΡΡΠ°Π·Ρ ΡΠΊΠ°ΠΆΡ: ΠΎΠ±ΠΌΠ°Π½ΡΡΡ ΠΌΠΎΠΆΠ½ΠΎ ΠΊΠΎΠ³ΠΎ ΡΠ³ΠΎΠ΄Π½ΠΎ, ΠΌΠΎΡΠ΅Π½Π½ΠΈΠΊΡ Π½ΡΠΆΠ½ΠΎ Π»ΠΈΡΡ ΠΎΠΊΠ°Π·Π°ΡΡΡΡ Π² Π½ΡΠΆΠ½ΠΎΠ΅ Π²ΡΠ΅ΠΌΡ Π² Π½ΡΠΆΠ½ΠΎΠΌ ΠΌΠ΅ΡΡΠ΅. ΠΠ°ΡΠ°ΡΡΡΡ ΡΡΠΎ Π½Π΅ ΡΠ°ΠΊ ΡΠ»ΠΎΠΆΠ½ΠΎ, ΠΊΠ°ΠΊ ΠΊΠ°ΠΆΠ΅ΡΡΡ. ΠΠ΄Π΅ΡΡ Π±ΡΠ΄Π΅Ρ ΠΈΡΡΠΎΡΠΈΡ ΡΠ΅Π»ΠΎΠ²Π΅ΠΊΠ°, ΠΊΠΎΡΠΎΡΠ°Ρ, Π½Π°Π΄Π΅ΡΡΡ, ΡΠ±Π΅Π΄ΠΈΡ Π²Π°Ρ Π²Π½ΠΈΠΌΠ°ΡΠ΅Π»ΡΠ½Π΅Π΅ ΠΎΡΠ½ΠΎΡΠΈΡΡΡΡ ΠΊ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ Π² Telegram. ΠΡΠΎΠ±Π΅Π½Π½ΠΎ Π΅ΡΠ»ΠΈ Π²Ρ ΡΠ΅ΡΠΈΠ»ΠΈΡΡ Π½Π° ΡΠΊΡΠΏΠ΅ΡΠΈΠΌΠ΅Π½ΡΡ Ρ ΠΊΡΠΈΠΏΡΠΎΠΉ.
https://habr.com/ru/companies/angarasecurity/articles/924584/
#red_team #ΡΡΠ΅ΠΉΠΌ #gophish #ΡΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠ΅_ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ #ΡΠΎΡΠΈΠ°Π»ΡΠ½Π°Ρ_ΠΈΠ½ΠΆΠ΅Π½Π΅ΡΠΈΡ #telegram #ΠΏΠ΅Π½ΡΠ΅ΡΡ
ΠΡΠ΅ΠΌ ΠΏΡΠΈΠ²Π΅Ρ! ΠΠ° ΡΠ²ΡΠ·ΠΈ ΡΠ½ΠΎΠ²Π° Π―ΠΊΠΎΠ² Π€ΠΈΠ»Π΅Π²ΡΠΊΠΈΠΉ, ΡΠΊΡΠΏΠ΅ΡΡ ΠΏΠΎ ΡΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Angara Security, ΠΏΠΎΠ΄Π΅Π»ΠΈΠ»ΡΡ ΠΎΠΏΡΡΠΎΠΌ ΠΎΠ±ΡΠ΅Π½ΠΈΡ Ρ ΠΌΠΎΡΠ΅Π½Π½ΠΈΠΊΠ°ΠΌΠΈ Telegram ΠΎΡΡΠ°Π΅ΡΡΡ ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΡΠΈΡ ΠΎΡΠ½ΠΎΠ²Π½ΡΡ ΠΌΠ΅ΡΡΠ΅Π½Π΄ΠΆΠ΅ΡΠΎΠ², Π°...
ΠΠΠΠΠΠ£ Π’ΠΠΠ―: ΡΠ΅ΠΌ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΈ ΠΌΠΎΠ³ΡΡ ΠΏΠΎΠΌΠΎΡΡ ΠΊΡΠ°ΡΠ½ΡΠΌ ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌ?
Π Π΄Π°Π½Π½ΠΎΠΉ ΡΡΠ°ΡΡΠ΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠΈΠΌ Π½ΠΎΠ²ΡΠΉ Π²Π·Π³Π»ΡΠ΄ Π½Π° ΡΠ°Π±ΠΎΡΡ Red Team Π΄Π»Ρ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΡΠ°ΠΌΡΡ ΠΈΠ·ΠΎΡΡΡΠ½Π½ΡΡ ΡΠΈΠΌΡΠ»ΡΡΠΈΠΉ Π°ΡΠ°ΠΊ, Π² ΠΊΠΎΡΠΎΡΡΡ ΠΊΠΎΠ΄ Π·Π°ΠΌΠ΅Π½ΡΠ΅ΡΡΡ ΡΠΌΠΎΡΠΈΡΠΌΠΈ, Π° ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΡΠΊΡΡΠ²Π°ΡΡΡΡ Π½Π΅ Π² ΠΠ, Π° Π² ΡΠ΅Π»ΠΎΠ²Π΅ΡΠ΅ΡΠΊΠΎΠΉ ΠΏΡΠΈΡ ΠΈΠΊΠ΅.
https://habr.com/ru/companies/angarasecurity/articles/896580/
#red_team #ΡΡΠ΅ΠΉΠΌ #gophish #Π‘ΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠ΅_ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ #ΡΠΎΡΠΈΠ°Π»ΡΠ½Π°Ρ_ΠΈΠ½ΠΆΠ΅Π½Π΅ΡΠΈΡ #ΠΏΠ΅Π½ΡΠ΅ΡΡ #osint #hr #ΡΠΎΡΠΈΠ°Π»ΡΠ½ΡΠ΅_ΡΠ΅ΡΠΈ
ΠΡΠ΅ΠΌ ΠΏΡΠΈΠ²Π΅Ρ! Π‘Π΅Π³ΠΎΠ΄Π½Ρ Π² Π½Π°ΡΠ΅ΠΌ ΡΡΠΈΡΠ΅ Π½ΠΎΠ²ΡΠΉ Π°Π²ΡΠΎΡ β Π―ΠΊΠΎΠ² Π€ΠΈΠ»ΡΠ²ΡΠΊΠΈΠΉ , ΡΠΊΡΠΏΠ΅ΡΡ ΠΏΠΎ ΡΠΎΡΠΈΠΎΡΠ΅Ρ Π½ΠΈΡΠ΅ΡΠΊΠΎΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ. Π Π²Ρ ΡΠΎΡΠ½ΠΎ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³? Β«ΠΠΎΠ»ΠΊ Π² ΠΎΠ²Π΅ΡΡΠ΅ΠΉ ΡΠΊΡΡΠ΅Β», Β«Π±Π΅ΡΠΏΡΠΈΠ½ΡΠΈΠΏΠ½ΡΠΉ Π½Π΅Π³ΠΎΠ΄ΡΠΉΒ» β ΡΠ°ΠΊΠΈΠ΅...
Life has felt a bit less hectic these last few months and I feel at peace with some things I wonβt go into. With that, Iβve been able to restructure what I want to focus on with a more narrow scope without my mind feeling as chaotic.
Some things Iβm starting / want to start soon:
Read the Psychology of Intelligence Analysis
Revisit learning #Go mainly for HTTP utilities
Learn #Evilginx and #GoPhish (apply Golang knowledge here) to get a deeper understanding of #phishing threats on both offensive and defensive side.
Read more in generalβ this #cti paper was very insightful https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062
This still appears to be somewhat broad scoped but it helps build a structure.
GoPhish Login Page Detected - 217[.]182[.]128[.]238:3333 - https://www.redpacketsecurity.com/gophish-login-detected-217-182-128-238-port-3333/
GoPhish Login Page Detected - 91[.]107[.]219[.]127:3333 - https://www.redpacketsecurity.com/gophish-login-detected-91-107-219-127-port-3333/
GoPhish Login Page Detected - 47[.]92[.]232[.]105:8443 - https://www.redpacketsecurity.com/gophish-login-detected-47-92-232-105-port-8443/