An0nUD4Y / Evilginx-Phishing-Infra-Setup
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
☆339Updated 2 months ago
Alternatives and similar repositories for Evilginx-Phishing-Infra-Setup:
Users that are interested in Evilginx-Phishing-Infra-Setup are comparing it to the libraries listed below
- ☆288Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆372Updated 8 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆550Updated 7 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆395Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆447Updated 2 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆209Updated 2 years ago
- Automated Active Directory Enumeration☆433Updated 3 weeks ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆364Updated last month
- Amsi Bypass payload that works on Windwos 11☆375Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆114Updated 7 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆284Updated 2 weeks ago
- Lab used for workshop and CTF☆172Updated 2 weeks ago
- Generate FUD backdoors☆243Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆653Updated 9 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆86Updated 11 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆113Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆514Updated 3 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆141Updated last month
- ☆293Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆93Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆365Updated 4 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆217Updated 6 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆315Updated last month
- ☆283Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆145Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆504Updated 6 months ago
- Useful C2 techniques and cheatsheets learned from engagements☆462Updated 4 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆241Updated this week
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago