froyo75 / docker-evilginx2Links
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆14Updated 4 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆89Updated last year
- sturdy-chainsaw☆69Updated 2 years ago
- Public repo of some woking evilginx phishlets☆40Updated last year
- ☆20Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Updated 9 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆62Updated last year
- Ready to go Phishing Platform☆57Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 3 weeks ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- ☆57Updated 8 months ago
- Excel Add In Payload Generator☆13Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 7 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆141Updated 6 months ago
- a port of privkit bof for havoc☆23Updated 2 years ago
- Havoc python api☆45Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆206Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆135Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- HTML smuggling is not an evil, it can be useful☆14Updated 3 years ago
- Most Responder's configuration power in your hand.☆52Updated last year