CyberSecurityUP / ShadowPhish
ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing, and command & control attacks through an intuitive graphical interface. Perfect for cybersecurity training, red team education, and security awareness programs.
☆92Updated this week
Alternatives and similar repositories for ShadowPhish:
Users that are interested in ShadowPhish are comparing it to the libraries listed below
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆147Updated 10 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆193Updated 2 months ago
- PowerShell Obfuscator☆171Updated 10 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆119Updated 3 weeks ago
- ☆81Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆139Updated 3 weeks ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆163Updated 4 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆89Updated 2 weeks ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆141Updated last week
- Continuous password spraying tool☆181Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆127Updated last year
- Everything and anything related to password spraying☆133Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆190Updated 2 weeks ago
- Inject RDPThief into memory with PowerShell.☆62Updated 3 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆179Updated 7 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆197Updated 6 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆161Updated 4 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆52Updated last week
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆102Updated last month
- A PoC for Early Cascade process injection technique.☆176Updated 2 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆193Updated 2 months ago
- Azure Post Exploitation Framework☆197Updated last month
- ☆69Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆138Updated last week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆151Updated 3 months ago
- ☆51Updated 2 months ago
- ☆83Updated 3 months ago