🎣 Just released: GoPhish MCP Server!

✨ Features:
🎯 Campaign management (CRUD + analytics)
πŸ‘₯ Groups, templates, pages, SMTP profiles
πŸ“Š Advanced analytics & reporting
πŸ” Smart search & utilities

https://github.com/dan1t0/gophish-mcp

#GoPhish #MCP #AI

En esta oportunidad y con la gran escalada de #spam que hay en el mundo te traigo #gophish un framework opensource que permite crear campaΓ±as de phising para que las lances internamente en tu empresa, veas los resultados, generes informes y realices las acciones pertinentes como #capacitaciΓ³n al personal.

Miralo en: https://luiszambrana.ar/campanas-de-phishing-para-revision-de-seguridad-interna-de-tu-empresa/
Si te gusta nuestros post te agradezco que compartas!!

🎯 Threat Intelligence
======================

πŸ› οΈ Tool

Executive summary: A curated catalog of 100 n8n workflow ideas
targeting Red Team, Blue Team (SOC/DFIR/TI), AppSec/DevSecOps and
general platform security. Each entry maps a specific objective to
integrations and a node-level flow outline suitable for direct
implementation in n8n.

Technical scope and components: The collection spans reconnaissance
(subfinder, amass, DNSDB), active scanning (nmap, naabu, masscan),
telemetry enrichment (Shodan, Censys, GeoIP, AbuseIPDB), offensive
tooling orchestration (GoPhish, custom IdP for lab credential sprays),
artifact lifecycle (S3/TimescaleDB/PostgreSQL), and C2/event
forwarding (CS/Havoc/Sliver webhooks). Flows consistently use common
n8n primitives: Cron/Webhook triggers, Exec/HTTP request nodes,
IF/Switch logic, database upserts, and batching/merge nodes for scale.

Implementation considerations: Several ideas assume controlled lab
environments (credential spraying, EDR evasion tests, malicious macro
builders). The patterns emphasize separation of concerns:
scanning/extraction β†’ enrichment β†’ dedupe/persistence β†’ alerting/issue
creation. Integrations call for credential handling via secret stores
and rate-limiting (delay/wait nodes) to avoid false positives and
service throttling.

Detection and defensive value: For Blue Team use-cases, flows include
automated ingestion of C2 events, decoy link tracking with GeoIP and
reputation scoring, exfiltration simulation to cloud storage for DLP
tuning, and continuous attack-surface change detection that creates
tickets for new/changed hosts or open ports. These provide repeatable
pipelines for measurement and tuning of SOC detections.

Operational risks and guardrails: Several recipes are explicitly
offensive and must remain confined to testbeds. Logging and artifact
management recommendations include hashing artifacts at ingest,
storing evidence in immutable buckets, and tagging DB records with
provenance to support IR workflows.

Concluding assessment: This collection is a practical playbook for
security teams seeking to automate repetitive reconnaissance, testing
and monitoring tasks using n8n. It lowers implementation friction by
providing ready-to-adapt node sequences and integration patterns.

πŸ”Ή n8n #automation #subfinder #gophish #bookmark

πŸ”— Source: https://github.com/CyberSecurityUP/n8n-CyberSecurity-Workflows

GitHub - CyberSecurityUP/n8n-CyberSecurity-Workflows: Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.

Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks. - CyberSecurityUP/n8n-CyberSecurity-Workflows

GitHub

Π£Π³Π½Π°Ρ‚ΡŒ Β«Ρ‚Π΅Π»Π΅Π³ΡƒΒ» Π·Π° 60 сСкунд: Π»Π°ΠΉΡ„Ρ…Π°ΠΊΠΈ ΠΏΠΎ ΠΏΡ€ΠΎΡ‚ΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ мошСнникам ΠΎΡ‚ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€Π°

ВсСм ΠΏΡ€ΠΈΠ²Π΅Ρ‚! На связи снова Π―ΠΊΠΎΠ² ЀилСвский, экспСрт ΠΏΠΎ социотСхничСскому Ρ‚Π΅ΡΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡŽ Angara Security, подСлился ΠΎΠΏΡ‹Ρ‚ΠΎΠΌ общСния с мошСнниками Telegram остаСтся ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΡˆΠΈΡ… основных мСссСндТСров, Π° Π°ΠΊΠΊΠ°ΡƒΠ½Ρ‚ Π² Π½Π΅ΠΌ β€” Ρ€Π°Π±ΠΎΡ‡ΠΈΠΌ ΠΈ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Ρ‹ΠΌ Π°ΠΊΡ‚ΠΈΠ²ΠΎΠΌ. Π£Π²Π΅Ρ€Π΅Π½Ρ‹, Ρ‡Ρ‚ΠΎ смоТСтС Π½Π΅ ΠΏΠΎΡ‚Π΅Ρ€ΡΡ‚ΡŒ Π΅Π³ΠΎ ΠΏΡ€ΠΈ Π°Ρ‚Π°ΠΊΠ΅ мошСнников? ΠŸΡ€Π΅Π΄ΡΡ‚Π°Π²ΠΈΠΌ Ρ‡Π΅Π»ΠΎΠ²Π΅ΠΊΠ°, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΡƒΠ²Π΅Ρ€Π΅Π½Π½Π΅Π΅ срСднСго ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Ρ ориСнтируСтся Π² ΠΊΡ€ΠΈΠΏΡ‚Π΅ ΠΈ Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΉ бСзопасности. ΠŸΠ°Ρ€Π° Π½Π΅Π²Π΅Ρ€Π½Ρ‹Ρ… дСйствий β€” ΠΈ Π΄Π°ΠΆΠ΅ ΠΎΠ½ тСряСт доступ ΠΊ своСму Π°ΠΊΠΊΠ°ΡƒΠ½Ρ‚Ρƒ. ΠœΠΈΠ½ΡƒΡ Π°ΠΊΡ‚ΠΈΠ²Ρ‹, минус Π°ΠΊΠΊΠ°ΡƒΠ½Ρ‚, Π° с Π½ΠΈΠΌ β€” всС пСрСписки ΠΈ ΠΏΠΎΠ»ΠΎΠ²ΠΈΠ½Π° Ρ€Π°Π±ΠΎΡ‡Π΅ΠΉ/ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΆΠΈΠ·Π½ΠΈ. Π―ΠΊΠΎΠ² ЀилСвский, экспСрт ΠΏΠΎ социотСхничСскому Ρ‚Π΅ΡΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡŽ Angara Security, рассказываСт, ΠΊΠ°ΠΊ выглядит Β«ΡƒΠ³ΠΎΠ½ β€žΡ‚Π΅Π»Π΅Π³ΠΈβ€œΒ» с Ρ‚ΠΎΡ‡ΠΊΠΈ зрСния ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΈΠΈ. Как ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Ρ‹ΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ сразу скаТу: ΠΎΠ±ΠΌΠ°Π½ΡƒΡ‚ΡŒ ΠΌΠΎΠΆΠ½ΠΎ ΠΊΠΎΠ³ΠΎ ΡƒΠ³ΠΎΠ΄Π½ΠΎ, ΠΌΠΎΡˆΠ΅Π½Π½ΠΈΠΊΡƒ Π½ΡƒΠΆΠ½ΠΎ лишь ΠΎΠΊΠ°Π·Π°Ρ‚ΡŒΡΡ Π² Π½ΡƒΠΆΠ½ΠΎΠ΅ врСмя Π² Π½ΡƒΠΆΠ½ΠΎΠΌ мСстС. Π—Π°Ρ‡Π°ΡΡ‚ΡƒΡŽ это Π½Π΅ Ρ‚Π°ΠΊ слоТно, ΠΊΠ°ΠΊ каТСтся. Π—Π΄Π΅ΡΡŒ Π±ΡƒΠ΄Π΅Ρ‚ история Ρ‡Π΅Π»ΠΎΠ²Π΅ΠΊΠ°, которая, надСюсь, ΡƒΠ±Π΅Π΄ΠΈΡ‚ вас Π²Π½ΠΈΠΌΠ°Ρ‚Π΅Π»ΡŒΠ½Π΅Π΅ ΠΎΡ‚Π½ΠΎΡΠΈΡ‚ΡŒΡΡ ΠΊ бСзопасности Π² Telegram. ОсобСнно Ссли Π²Ρ‹ Ρ€Π΅ΡˆΠΈΠ»ΠΈΡΡŒ Π½Π° экспСримСнты с ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠΉ.

https://habr.com/ru/companies/angarasecurity/articles/924584/

#red_team #Ρ„Ρ€Π΅ΠΉΠΌ #gophish #социотСхничСскоС_тСстированиС #ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Π°Ρ_инТСнСрия #telegram #пСнтСст

Π£Π³Π½Π°Ρ‚ΡŒ Β«Ρ‚Π΅Π»Π΅Π³ΡƒΒ» Π·Π° 60 сСкунд: Π»Π°ΠΉΡ„Ρ…Π°ΠΊΠΈ ΠΏΠΎ ΠΏΡ€ΠΎΡ‚ΠΈΠ²ΠΎΠ΄Π΅ΠΉΡΡ‚Π²ΠΈΡŽ мошСнникам ΠΎΡ‚ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠ³ΠΎ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€Π°

ВсСм ΠΏΡ€ΠΈΠ²Π΅Ρ‚! На связи снова Π―ΠΊΠΎΠ² ЀилСвский, экспСрт ΠΏΠΎ социотСхничСскому Ρ‚Π΅ΡΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡŽ Angara Security, подСлился ΠΎΠΏΡ‹Ρ‚ΠΎΠΌ общСния с мошСнниками Telegram остаСтся ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΡˆΠΈΡ… основных мСссСндТСров, Π°...

Π₯Π°Π±Ρ€

ΠžΠ‘ΠœΠΠΠ£ Π’Π•Π‘Π―: Ρ‡Π΅ΠΌ психологи ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΠΎΠΌΠΎΡ‡ΡŒ красным ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌ?

Π’ Π΄Π°Π½Π½ΠΎΠΉ ΡΡ‚Π°Ρ‚ΡŒΠ΅ ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠΈΠΌ Π½ΠΎΠ²Ρ‹ΠΉ взгляд Π½Π° Ρ€Π°Π±ΠΎΡ‚Ρƒ Red Team для создания самых ΠΈΠ·ΠΎΡ‰Ρ€Ρ‘Π½Π½Ρ‹Ρ… симуляций Π°Ρ‚Π°ΠΊ, Π² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… ΠΊΠΎΠ΄ замСняСтся эмоциями, Π° уязвимости ΡΠΊΡ€Ρ‹Π²Π°ΡŽΡ‚ΡΡ Π½Π΅ Π² ПО, Π° Π² чСловСчСской психикС.

https://habr.com/ru/companies/angarasecurity/articles/896580/

#red_team #Ρ„Ρ€Π΅ΠΉΠΌ #gophish #БоциотСхничСскоС_тСстированиС #ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Π°Ρ_инТСнСрия #пСнтСст #osint #hr #ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Ρ‹Π΅_сСти

ΠžΠ±ΠΌΠ°Π½Ρƒ тСбя: Ρ‡Π΅ΠΌ психологи ΠΌΠΎΠ³ΡƒΡ‚ ΠΏΠΎΠΌΠΎΡ‡ΡŒ красным ΠΊΠΎΠΌΠ°Π½Π΄Π°ΠΌ?

ВсСм ΠΏΡ€ΠΈΠ²Π΅Ρ‚! БСгодня Π² нашСм эфирС Π½ΠΎΠ²Ρ‹ΠΉ Π°Π²Ρ‚ΠΎΡ€ β€” Π―ΠΊΠΎΠ² Ѐилёвский , экспСрт ΠΏΠΎ ΡΠΎΡ†ΠΈΠΎΡ‚СхничСскому Ρ‚Π΅ΡΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡŽ. А Π²Ρ‹ Ρ‚ΠΎΡ‡Π½ΠΎ психолог? Β«Π’ΠΎΠ»ΠΊ Π² ΠΎΠ²Π΅Ρ‡ΡŒΠ΅ΠΉ ΡˆΠΊΡƒΡ€Π΅Β», «бСспринципный нСгодяй» β€” Ρ‚Π°ΠΊΠΈΠ΅...

Π₯Π°Π±Ρ€
Uncovering GoPhish Deployments

Patterns, Tools, and Techniques

Cyber Intelligence Insights

Life has felt a bit less hectic these last few months and I feel at peace with some things I won’t go into. With that, I’ve been able to restructure what I want to focus on with a more narrow scope without my mind feeling as chaotic.
Some things I’m starting / want to start soon:
Read the Psychology of Intelligence Analysis
Revisit learning #Go mainly for HTTP utilities
Learn #Evilginx and #GoPhish (apply Golang knowledge here) to get a deeper understanding of #phishing threats on both offensive and defensive side.
Read more in generalβ€” this #cti paper was very insightful https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062

This still appears to be somewhat broad scoped but it helps build a structure.

GoPhish Login Page Detected - 217[.]182[.]128[.]238:3333 - RedPacket Security

GoPhish Login Page Detection Alerts

RedPacket Security
GoPhish Login Page Detected - 91[.]107[.]219[.]127:3333 - RedPacket Security

GoPhish Login Page Detection Alerts

RedPacket Security
GoPhish Login Page Detected - 47[.]92[.]232[.]105:8443 - RedPacket Security

GoPhish Login Page Detection Alerts

RedPacket Security