froyo75 / docker-evilginx2
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for docker-evilginx2
- ☆17Updated 11 months ago
- sturdy-chainsaw☆52Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆34Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆158Updated 5 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆85Updated 4 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆90Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆91Updated last week
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆14Updated this week
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- Continuous password spraying tool☆117Updated this week
- Creating a Malicious Macro using MS Word☆17Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆15Updated 9 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Parses Snaffler output file and generate beautified outputs.☆37Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆88Updated 3 weeks ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆158Updated 8 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆45Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆165Updated 6 months ago