CanIPhish / PhishiousView external linksLinks
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
☆512Apr 15, 2023Updated 2 years ago
Alternatives and similar repositories for Phishious
Users that are interested in Phishious are comparing it to the libraries listed below
Sorting:
- evilginx3 + gophish☆1,952Jun 15, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Aug 18, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,083Jun 10, 2024Updated last year
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago
- XLL Phishing Tradecraft☆438May 24, 2022Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆600Jul 22, 2022Updated 3 years ago
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Jan 19, 2023Updated 3 years ago
- A script that helps you understand why your E-Mail ended up in Spam☆671Apr 17, 2025Updated 9 months ago
- Template-Driven AV/EDR Evasion Framework☆1,774Nov 3, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,585Jul 31, 2024Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Dec 9, 2025Updated 2 months ago
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Apr 16, 2025Updated 9 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 3 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,301Aug 15, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,004Jun 4, 2024Updated last year
- An Office365 User Attack Tool☆645Mar 19, 2024Updated last year
- .NET/PowerShell/VBA Offensive Security Obfuscator☆514Feb 1, 2024Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- TartarusGate, Bypassing EDRs☆649Jan 25, 2022Updated 4 years ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆248Feb 23, 2022Updated 3 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆463Jul 15, 2022Updated 3 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Feb 27, 2024Updated last year
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- ☆2,169Feb 21, 2023Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆400Updated this week
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,098Apr 19, 2023Updated 2 years ago
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆313Nov 29, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago