aalex954 / evilginx2-TTPsLinks
Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and notes on usage.
☆148Updated 5 months ago
Alternatives and similar repositories for evilginx2-TTPs
Users that are interested in evilginx2-TTPs are comparing it to the libraries listed below
Sorting:
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆180Updated last year
- sturdy-chainsaw☆65Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆80Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆166Updated 2 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆120Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Continuous password spraying tool☆192Updated 6 months ago
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆452Updated 3 months ago
- Generate FUD backdoors☆253Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆80Updated 3 years ago
- ☆303Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆109Updated 2 months ago
- ☆182Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆192Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆421Updated last year
- ☆105Updated last year
- ☆200Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆241Updated last week
- ☆303Updated 6 months ago
- Ready to go Phishing Platform☆56Updated 11 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆223Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆207Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆192Updated 11 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆304Updated last month
- ☆24Updated last year
- Public repo of some woking evilginx phishlets☆38Updated 10 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆335Updated 3 months ago
- Python utility that generates "imageless" QR codes in various formats☆127Updated last year