aalex954 / evilginx2-TTPsLinks
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.
☆140Updated 3 months ago
Alternatives and similar repositories for evilginx2-TTPs
Users that are interested in evilginx2-TTPs are comparing it to the libraries listed below
Sorting:
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- sturdy-chainsaw☆63Updated last year
- Updated o365 Evilginx phishlet for WHfB☆28Updated last year
- Continuous password spraying tool☆191Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆425Updated last month
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆158Updated 2 weeks ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆129Updated 5 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆118Updated 2 years ago
- ☆298Updated 2 years ago
- Generate FUD backdoors☆249Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆124Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆258Updated 2 weeks ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆243Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆321Updated last month
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆205Updated 2 months ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆40Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated this week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆258Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- ☆104Updated 10 months ago
- A PoC for Early Cascade process injection technique.☆186Updated 5 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆183Updated last week
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆187Updated 11 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆411Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆203Updated last year