WhiteOakSecurity / autosneakphish
Automated evasive phishing infrastructure
☆18Updated 2 years ago
Alternatives and similar repositories for autosneakphish:
Users that are interested in autosneakphish are comparing it to the libraries listed below
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆109Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆135Updated 6 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- Some scripts to support with importing large datasets into BloodHound☆79Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- Collection of tools to use with Azure Applications☆107Updated last year
- Living Off the Foreign Land setup scripts☆64Updated last month
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated this week
- ☆157Updated 3 months ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- ☆113Updated last year
- PowerShell Reverse Shell☆61Updated last year
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- pysnaffler☆88Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆44Updated last month
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆78Updated last year
- Hybrid AD utilities for ROADtools☆67Updated 3 weeks ago
- C2 Automation using Linode☆80Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 5 months ago
- ☆96Updated 2 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated last year
- Malware As A Service☆130Updated 11 months ago