Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
☆352Jun 18, 2024Updated last year
Alternatives and similar repositories for evilqr
Users that are interested in evilqr are comparing it to the libraries listed below
Sorting:
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,105Jun 19, 2024Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- evilginx3 + gophish☆1,961Jun 15, 2024Updated last year
- ☆291Jul 20, 2023Updated 2 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆622Jun 25, 2024Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆186Mar 14, 2025Updated 11 months ago
- Ready to go Phishing Platform☆1,111May 6, 2025Updated 10 months ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 5 months ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆137Aug 10, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆863Feb 3, 2024Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated 2 months ago
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆609Dec 9, 2025Updated 3 months ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆569Jan 20, 2026Updated last month
- Bypassing UAC with SSPI Datagram Contexts☆462Sep 24, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated last week
- A beacon object file implementation of PoolParty Process Injection Technique.☆435Dec 21, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated 11 months ago
- ☆75Feb 4, 2024Updated 2 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆788Jan 9, 2025Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆301Feb 2, 2026Updated last month
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆272Jan 18, 2023Updated 3 years ago