Deploy a phishing infrastructure on the fly.
☆77Dec 21, 2024Updated last year
Alternatives and similar repositories for flyphish
Users that are interested in flyphish are comparing it to the libraries listed below
Sorting:
- ☆53Sep 23, 2025Updated 5 months ago
- ☆41Feb 20, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls to evade UM EDR hooks☆139Dec 22, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- ☆26Aug 11, 2025Updated 7 months ago
- ☆58Feb 16, 2025Updated last year
- A Reflective Loader for macOS☆148Jul 20, 2025Updated 8 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆221Nov 3, 2025Updated 4 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 10 months ago
- Port of Cobalt Strike's Process Inject Kit☆192Dec 1, 2024Updated last year
- Shellcode loader☆101Nov 24, 2024Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆385Jan 23, 2025Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆343Oct 7, 2024Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- Templates for developing your own listeners and agents for AdaptixC2.☆47Feb 28, 2026Updated 3 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- ☆44Jun 1, 2025Updated 9 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated 2 weeks ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago