VirtualSamuraii / flyphishLinks
Deploy a phishing infrastructure on the fly.
☆74Updated 8 months ago
Alternatives and similar repositories for flyphish
Users that are interested in flyphish are comparing it to the libraries listed below
Sorting:
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Situational Awareness script to identify how and where to run implants☆57Updated 8 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 9 months ago
- ☆33Updated 2 months ago
- A small red team course☆40Updated 2 years ago
- Your Skyfall Infrastructure Pack☆76Updated last week
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- ☆64Updated last week
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆40Updated 7 months ago
- ☆50Updated 9 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 9 months ago
- Permanently disable EDRs as local admin☆94Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆39Updated 8 months ago
- ☆58Updated 9 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 3 weeks ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- ☆44Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆53Updated 6 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- ☆57Updated 6 months ago
- ☆39Updated 6 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- Lifetime AMSI bypass.☆35Updated 4 months ago
- Payload Generation Workflow☆40Updated last month
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 5 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆56Updated last month
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆83Updated 3 weeks ago
- Python3 rewrite of AsOutsider features of AADInternals☆53Updated last month