Swordphish is a platform allowing to create and manage fake phishing campaigns. Identifying security contacts may be hard in a big structure, that's why we developed Swordphish and a button embedded in the mail client to help our users to report suspicious mail to security teams just with a simple click. This choice seriously improved our visibility on what our users are receiving, and we decided to release it to the community! Swordphish can be used to train people identifying suspicious mails, and it can help checking that people report correctly the mails to security teams. Installation Detailed installation instructions can be found in the documentation. Docker images Swordphish has a docker-compose script to get up and running quickly.
FEATURES
SIMILAR TOOLS
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.
A repository providing guidance on mitigating hardware and firmware security vulnerabilities including side-channel attacks, UEFI hardening, and microcode vulnerabilities.
Android vulnerability analysis system with efficient scanning and high accuracy.
A spam prevention technique using hidden fields to detect and deter spam bots in Laravel applications.
Verify scripts and executables to mitigate chain of supply attacks.
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
A cross-platform software library for interacting with iOS devices without jailbreaking.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.