Anglerphish — A Feature-Rich Gophish Fork
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,了解主要内容。文章讲的是从一个副项目发展成升级版的Gophish平台,叫做Anglerphish。 Gophish在网络安全中很常用,但用户发现它有很多限制,比如只能单向量攻击、缺乏编排、手动工作多。作者从基本的本地活动开始,逐渐转向生产部署,并在实际客户中使用。他深入研究了平台内部和社区的修改,最终决定自己扩展它。 Anglerphish增加了多向量支持,比如短信、QR码、HTTP基本认证等。还有编排功能,可以保存草稿,批量管理活动。报告功能也增强了,可以直接导出Word或Excel。此外,还增加了安全改进,比如AES加密。 总结的时候要抓住主要点:升级后的平台解决了Gophish的限制,增加了多向量攻击、编排、报告和安全功能。这些内容需要简洁明了地表达出来,并且控制在100字以内。 可能的结构是:Anglerphish是基于Gophish的升级版,增加了多向量支持、编排功能、报告工具和安全措施。这样既涵盖了主要改进点,又简短有力。 </think> 文章介绍了从Gophish发展而来的Anglerphish平台的升级功能和改进之处。该平台扩展了多向量攻击能力(如短信、QR码、HTTP认证等),优化了活动编排流程(支持草稿保存和批量管理),增强了报告生成能力(支持Word/Excel导出),并提升了安全性(引入AES加密)。这些改进旨在满足更复杂的网络安全需求。 2026-3-31 06:37:20 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

George Petropoulos

Press enter or click to view image in full size

From Side Project to an Upgraded Gophish Platform

If you work in cyber security, chances are you’ve come across Gophish at some point — whether in testing, labs, or real engagements.

But once you move beyond basic setups, its limitations become clear: single-vector campaigns, lack of orchestration, and a lot of repetitive manual work.

Like many others, I started with basic local campaigns before gradually moving into production deployments. As I began using it in real client engagements.

The deeper I worked with the platform, the more I explored its internals and community-driven modifications. Eventually, one question came up:

Why not extend it myself?

Inspired by community-driven modifications and tools like Evilgophish, I began building extensions on top of Gophish while keeping its familiar workflows intact.

What began as a small, fun, side project, gradually evolved into the fork I now call Anglerphish.

Notable Enhancements

Over time, this fork grew beyond what I initially set out to build and now includes more changes than would fit in a single article. Below are a few highlights that had the most practical impact.

Multi-Vector Campaign Support

Traditional phishing simulations tend to revolve around email. And while that still works, real-world attacks have clearly moved beyond a single vector.

Anglerphish expands the campaign engine to support:

  • Native SMS campaigns (Twilio & Vonage support) — following the same familiar workflow as email campaigns, but adapted for SMS delivery.
  • QR code campaigns — generated dynamically through a simple placeholder parameter, enabling seamless embedding into emails, landing pages, or documents.
  • HTTP Basic Authentication landing flows — replacing traditional HTML landing pages with a browser-native authentication prompt for infrastructure-style scenarios.
  • Generic campaigns for off-channel distribution (QR posters, offline delivery, internal messaging, etc.) — allowing fully hostable, trackable landing pages to be generated and shared through virtually any medium.
  • MFA simulation with OTP tracking (Sent / Verified / Failed) — integrated directly into the existing campaign flow and enabled through landing page configuration, without requiring a separate campaign type.

The MFA functionality is not designed to replicate full real-time interception frameworks such as Evilginx. Instead, it leverages integrated email and SMS flows to simulate realistic multi-step authentication scenarios within the same platform.

Of course the possibilities of integrations are endless and there’s still room to expand!

Press enter or click to view image in full size

Campaign Creation Preview

Press enter or click to view image in full size

HTTP Basic Auth Landing Page

Campaign Orchestration at Scale

One of the most frustrating parts of working with Gophish during larger engagements was orchestration.

There’s no “save as draft” workflow. Each campaign must be launched or scheduled before you can move on. And if you realize something needs adjusting after launch, the only option is to delete and recreate it from scratch.

That friction led to the idea of Campaign Sets — a way to prepare and manage multiple campaigns before launching anything.

Campaign Sets allow multiple campaigns (Email and SMS) to be grouped and configured together. Each campaign can maintain its own settings, while shared parameters — such as landing pages, URLs, or launch schedules — can be defined across the entire set.

Get George Petropoulos’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

Most importantly, sets can be saved as drafts. You can iterate, review, and refine before executing — making multi-scenario assessments significantly easier to plan and manage.

Press enter or click to view image in full size

Draft Campaign Set Creation Preview

Once launched, campaigns behave exactly as they normally would and remain individually accessible for monitoring and reporting.

Reporting Support

Reporting is often one of the most time-consuming parts of phishing engagements — not because it’s complex, but because it’s repetitive.

Exporting CSVs, building charts, and formatting results into client-ready reports quickly becomes a manual and time-consuming process.

To address this, I added a dedicated Reports to Anglerphish. Campaign results can now be exported directly as structured Word or Excel reports.

These reports may not replace fully customized deliverables, but they provide clean, presentation-ready content that significantly reduces manual post-processing time.

Reports can be generated for individual campaigns or entire campaign sets. Privacy options allow partial anonymization of sensitive data — such as email addresses, phones or IPs — making it easier to share results with clients or external stakeholders.

The reporting engine is powered by Python and includes built-in environment checks to ensure required dependencies are available, streamlining setup.

Press enter or click to view image in full size

Reports Section Preview

Security Improvements Within the Platform

Gophish so far had no database encryption, leaving exposed SMTP or IMAP configuration passwords, and of course target passwords when collected.

Anglerphish introduces optional, application-level AES-256-GCM encryption for sensitive database fields, including SMTP credentials, SMS provider keys, IMAP passwords, and captured data.

Encryption is controlled via environment configuration, remains fully backward compatible, and includes migration support — allowing existing deployments to transition to an encrypted state without breaking functionality.

Press enter or click to view image in full size

Migrating Sensitive Fields to Encrypted State

“Skipped” includes rows where there are no event details (i.e., Email Sent, Campaign Created)

Additional Improvements

Beyond the features highlighted above, Anglerphish includes several refinements, additions, and quality-of-life improvements such as:

  • URL templates for reusable complex structures
  • Email, SMS, and Landing Page template previews for quick content review
  • Enhanced IMAP monitoring, supporting multiple configurations and tracking both email Replies and Reported messages
  • Expanded template variables for dynamic personalization
  • In-app documentation for newly introduced features

All being well, I may share more detailed breakdowns of specific features in the future and continue expanding the platform.

The complete feature set is documented in the GitHub repository. If this sounds interesting, I encourage you to explore it and experiment with the fork yourself. If you find it useful, a star on GitHub is always appreciated.

Anglerphish is not intended to replace Gophish, but to extend it in ways shaped by real-world operational needs.

As real-world engagements grow in complexity, tooling needs to evolve to remain practical and efficient. This project is a step in that direction.

What began as incremental improvements evolved into a more flexible platform for phishing simulations — built with compatibility, practicality, and security in mind.

Project Repository


文章来源: https://infosecwriteups.com/anglerphish-6dc3e5520242?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh