JoelGMSec / EvilnoVNC
Ready to go Phishing Platform
☆836Updated last month
Related projects: ⓘ
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 7 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆449Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆294Updated last year
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆534Updated last month
- Generates millions of keyword-based password mutations in seconds.☆1,060Updated last month
- evilginx3 + gophish☆1,610Updated 3 months ago
- ☆697Updated 2 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆766Updated 5 months ago
- A simple python packer to easily bypass Windows Defender☆626Updated 2 years ago
- Script for generating revshells☆451Updated last week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆946Updated 3 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,394Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,154Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆328Updated 9 months ago
- An XSS exploitation command-line interface and payload generator.☆1,233Updated last month
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆401Updated 6 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆359Updated 3 years ago
- Python AV Evasion Tools☆489Updated 2 years ago
- ☆349Updated this week
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆371Updated 2 years ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆998Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆302Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆823Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆585Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆690Updated last month
- zerosum0x0's Koadic☆257Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆397Updated 2 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,023Updated 3 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆466Updated 3 months ago