froyo75 / docker-evilginx2Links
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆14Updated 4 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- sturdy-chainsaw☆67Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆89Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆159Updated 8 months ago
- Public repo of some woking evilginx phishlets☆39Updated last year
- Ready to go Phishing Platform☆57Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆30Updated this week
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆59Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- ☆20Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- A C2 framework built for my bachelors thesis☆54Updated 3 weeks ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆97Updated 3 weeks ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆14Updated 2 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆128Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Excel Add In Payload Generator☆13Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated 11 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- ☆106Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- A script to automate keystrokes through a graphical desktop program.☆34Updated 6 months ago
- execute PE in memory Filelessly☆50Updated 10 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- Vast.ai Password Kracking☆92Updated 2 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆176Updated last month
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆49Updated last year