froyo75 / docker-evilginx2Links
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆14Updated 4 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆89Updated last year
- sturdy-chainsaw☆68Updated 2 years ago
- Public repo of some woking evilginx phishlets☆40Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Updated 9 months ago
- ☆20Updated 2 years ago
- Ready to go Phishing Platform☆56Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆61Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆30Updated last week
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Vast.ai Password Kracking☆92Updated 2 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 7 months ago
- ☆57Updated 7 months ago
- A C2 framework built for my bachelors thesis☆56Updated last week
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago
- Easily obfuscate your html!☆98Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆101Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆15Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆183Updated 2 months ago
- Excel Add In Payload Generator☆13Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Simulation and red team Phishing Framework☆145Updated 3 weeks ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated 11 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆111Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Updated 4 years ago