BakkerJan / evilginx3Links
sturdy-chainsaw
☆65Updated 2 years ago
Alternatives and similar repositories for evilginx3
Users that are interested in evilginx3 are comparing it to the libraries listed below
Sorting:
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆180Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆134Updated 7 months ago
- ☆161Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆109Updated 2 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆192Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- ☆91Updated 8 months ago
- Continuous password spraying tool☆192Updated 6 months ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 8 months ago
- Everything and anything related to password spraying☆145Updated last year
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆204Updated 8 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- ☆112Updated 3 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Cortex XDR Config Extractor☆133Updated 2 years ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆241Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- Parses Snaffler output file and generate beautified outputs.☆107Updated 7 months ago
- A community-driven collection of BloodHound queries☆138Updated last week
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- ☆96Updated last week
- A Red Team Activity Hub☆220Updated last month
- Most Responder's configuration power in your hand.☆51Updated 7 months ago
- Automated exploitation of MSSQL servers at scale☆117Updated 3 weeks ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆171Updated 4 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 4 months ago