JoelGMSec / EvilnoVNC
Ready to go Phishing Platform
☆899Updated 5 months ago
Alternatives and similar repositories for EvilnoVNC:
Users that are interested in EvilnoVNC are comparing it to the libraries listed below
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆439Updated 3 weeks ago
- Generates millions of keyword-based password mutations in seconds.☆1,244Updated 5 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆514Updated 11 months ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆597Updated 2 months ago
- A simple python packer to easily bypass Windows Defender☆632Updated 2 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆464Updated last year
- evilginx3 + gophish☆1,703Updated 7 months ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆781Updated 9 months ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,414Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,008Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,180Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆838Updated 2 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆334Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆275Updated 6 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆996Updated 7 months ago
- AV evading OSX Backdoor and Crypter Framework☆277Updated 10 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆344Updated 11 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆431Updated last month
- Script for generating revshells☆457Updated 4 months ago
- Command & Control-Framework created for collaboration in python3☆313Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,284Updated 2 weeks ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆369Updated 7 months ago
- ☆712Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆410Updated 6 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆718Updated last week
- Simple & Powerful PowerShell Script Obfuscator☆536Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆589Updated 2 years ago