An0nUD4Y / Evilginx-Phishing-Infra-Setup
Evilginx Phishing Engagement Infrastructure Setup Guide
☆297Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for Evilginx-Phishing-Infra-Setup
- ☆275Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆510Updated 4 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆399Updated 2 months ago
- Amsi Bypass payload that works on Windwos 11☆369Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆344Updated 5 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆341Updated 3 weeks ago
- Generate FUD backdoors☆238Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆268Updated 3 weeks ago
- Automated Active Directory Enumeration☆412Updated this week
- Materials for the workshop "Red Team Ops: Havoc 101"☆349Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆413Updated 7 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆184Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆209Updated last month
- Tool to remotely dump secrets from the Windows registry☆398Updated 3 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆85Updated 4 months ago
- ☆281Updated 11 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated 8 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆638Updated 5 months ago
- Ask a TGS on behalf of another user without password☆464Updated 3 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆425Updated 3 weeks ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆492Updated 3 months ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆296Updated 2 months ago
- Lab used for workshop and CTF☆153Updated 3 weeks ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 5 months ago
- Everything and anything related to password spraying☆126Updated 5 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆256Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆155Updated 2 months ago
- Certified Red Team Operator☆192Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆141Updated last year