froyo75 / docker-evilginx2
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆10Updated 2 years ago
Related projects: ⓘ
- sturdy-chainsaw☆49Updated last year
- ☆16Updated 9 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆80Updated 2 months ago
- A C2 framework built for my bachelors thesis☆51Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆155Updated 3 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆63Updated 3 months ago
- a port of privkit bof for havoc☆21Updated 9 months ago
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆78Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆72Updated 3 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆151Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆42Updated 2 weeks ago
- Continuous password spraying tool☆112Updated 3 months ago
- Simple netexec wraper with html repport☆17Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆38Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆85Updated 6 months ago
- Lifetime AMSI bypass.☆35Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆104Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 9 months ago
- Most Responder's configuration power in your hand.☆36Updated 6 months ago
- ☆50Updated 7 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆54Updated this week
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆78Updated 8 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆12Updated last week
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆131Updated last month
- Python utility that generates "imageless" QR codes in various formats☆88Updated last month
- Creating a Malicious Macro using MS Word☆15Updated 2 years ago