Ahaz1701 / EvilWorkerLinks
A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its minimalist, robust, and highly adaptable architecture, this solution can be easily deployed on PaaS.
☆138Updated 5 months ago
Alternatives and similar repositories for EvilWorker
Users that are interested in EvilWorker are comparing it to the libraries listed below
Sorting:
- ☆94Updated last year
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- pysnaffler☆109Updated last week
- ☆157Updated 8 months ago
- The DCERPC only printerbug.py version☆187Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆34Updated 3 months ago
- Adversary Emulation Framework☆129Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆116Updated 6 months ago
- ☆120Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆153Updated 2 months ago
- Utilities for obfuscating shellcode☆97Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- OAuth Device Code Phishing Toolkit☆107Updated 4 months ago
- Generate and Manage KeyCredentialLinks☆180Updated 3 months ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆180Updated 3 months ago
- Permanently disable EDRs as local admin☆124Updated 3 weeks ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆60Updated 10 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆97Updated last year
- ☆75Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆154Updated last week
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆160Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆76Updated 2 weeks ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆189Updated last week
- ☆165Updated last year