Important: This repository documents a controlled lab exercise run in an isolated VirtualBox environment for educational, offensive, and forensic analysis only. It does not include, nor will it provide, exploit code, working malware samples, operational playbooks, or step-by-step instructions that would enable replication or distribution of malicious tools. Do not attempt to run, reproduce, or distribute malware outside of authorized, legally compliant lab environments.
- This work is for education purpose only.
- Running malware outside of an isolated, authorized lab is illegal and unethical.
- If you are documenting real incidents affecting production systems, do not publish sensitive artifacts.
- Do not rely on this document to reproduce, deploy, or weaponize.
This repository documents a controlled, isolated lab exercise performed inside VirtualBox to study and analyze the behavior of GoPhish tool in a safe environment.
Typical controlled lab baseline used:
- Virtualization: VirtualBox
- Guest OS: Kali Linux
This is the base dashboard when Firstly viewing the GoPhish platform(for the first Time).
This is basicaaly teh targeted 🎯 Profile Where we need to add their details like:
- Name: to identify the target easily.
- SMTP from: which is the from address.
- Username & Password: Where for security purpose we need to create dummy app profileusing your gmail account click here for the process