VirtualSamuraii / flyphish
Deploy a phishing infrastructure on the fly.
☆68Updated 3 months ago
Alternatives and similar repositories for flyphish:
Users that are interested in flyphish are comparing it to the libraries listed below
- ☆54Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 8 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- ☆49Updated 4 months ago
- Adversary Emulation Framework☆92Updated 8 months ago
- Your Skyfall Infrastructure Pack☆64Updated last week
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- Lifetime AMSI bypass.☆35Updated 8 months ago
- A Python POC for CRED1 over SOCKS5☆144Updated 5 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆135Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆41Updated 3 weeks ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago
- ☆53Updated 5 months ago
- ☆37Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 3 months ago
- ☆103Updated last month
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆83Updated 3 months ago
- BloodHound PowerShell client☆51Updated last week
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆28Updated 2 weeks ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆81Updated 6 months ago