Deploy a phishing infrastructure on the fly.
☆77Dec 21, 2024Updated last year
Alternatives and similar repositories for flyphish
Users that are interested in flyphish are comparing it to the libraries listed below
Sorting:
- ☆53Sep 23, 2025Updated 5 months ago
- ☆41Feb 20, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆137Dec 22, 2024Updated last year
- ☆26Aug 11, 2025Updated 6 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 10 months ago
- A Reflective Loader for macOS☆147Jul 20, 2025Updated 7 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆340Oct 7, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated 3 weeks ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆221Nov 3, 2025Updated 3 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- ☆58Feb 16, 2025Updated last year
- Port of Cobalt Strike's Process Inject Kit☆191Dec 1, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- Shellcode loader☆101Nov 24, 2024Updated last year
- Adversary Emulation Framework☆130Jul 1, 2025Updated 8 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 10 months ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆167Nov 17, 2025Updated 3 months ago
- ☆42Jun 1, 2025Updated 9 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- TokenCert☆102Nov 15, 2024Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 10 months ago