froyo75 / docker-evilginx2
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆12Updated 3 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- ☆19Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- sturdy-chainsaw☆57Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆50Updated 4 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Updated o365 Evilginx phishlet for WHfB☆24Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆129Updated last month
- Public repo of some woking evilginx phishlets☆32Updated 6 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆33Updated 2 years ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆81Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆110Updated 4 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- Most Responder's configuration power in your hand.☆49Updated 3 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆43Updated 3 weeks ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆21Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago
- ☆85Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- ☆58Updated 7 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last month
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Phishing Framework for OTP codes☆19Updated last week
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago