Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. This user guide introduces Gophish and shows how to use the software, building a complete campaign from start to finish.

the usage of gophish and very neat installation procedures inspired by note post on blog . so i will get brief installation of gophish with postfix server first then . bypass Digital ocean public IP address blacklisted .

installation of postfix server

apt-get install postfix

configuration of postfix

then you have to modify the following value as your own digital ocean droplet

 nano /etc/postfix/
myhostname = {SMTP SERVER }
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
mydestination = $myhostname, ubt, ubuntu-s-1vcpu-1gb-fra1-01, localhost.localdomain, localhost
relayhost =

after saving these information , you have to reload postfix configuration

service postfix reload

from your terminal , execute the following commands

wget apt install unzip
chmod +x gophish
after installation is finished , run it ./gophish
## Access GoPhish by SSH tunneling

gophish in default is running on local interface with port 3333 , so we have to start ssh tunneling to access it
ssh root@ipofdroplet -L3333:localhost:3333 -N -f
access it `https:\\localhost:3333`

installation of Free SSL Certification for Postfix or Gophish

apt install certbot

generate ssl certification

certbot certonly --standalone -d

the paths of certifications comes as following examples

to activate ssl on **postfix** you have to edit `` as 


in case want to activate ssl certification on Gophish , edit config.json and replace it with correct path

"admin_server": {
"listen_url": "",
"use_tls": true,
"cert_path": "gophish_admin.crt",
"key_path": "gophish_admin.key"
"phish_server": {
"listen_url": "",
"use_tls": false,
"cert_path": "example.crt",
"key_path": "example.key"

Bypass Blocked Public IP While sending through SMTP

access your droplet via ssh then execute the following command first

 curl -s

then copy the ip address from output and execute the following

route add default gw {IP}
route del default gw

to validate execute the following from box cli