kgretzky / evilqrView external linksLinks
Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
☆349Jun 18, 2024Updated last year
Alternatives and similar repositories for evilqr
Users that are interested in evilqr are comparing it to the libraries listed below
Sorting:
- Send phishing messages and attachments to Microsoft Teams users☆1,104Jun 19, 2024Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- evilginx3 + gophish☆1,952Jun 15, 2024Updated last year
- ☆290Jul 20, 2023Updated 2 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Jan 5, 2024Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆621Jun 25, 2024Updated last year
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆184Mar 14, 2025Updated 11 months ago
- Ready to go Phishing Platform☆1,101May 6, 2025Updated 9 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Sep 17, 2025Updated 5 months ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆402Sep 14, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆136Aug 10, 2024Updated last year
- ☆90Aug 5, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆859Feb 3, 2024Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,010Jan 7, 2026Updated last month
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆563Jan 20, 2026Updated 3 weeks ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- Bypassing UAC with SSPI Datagram Contexts☆460Sep 24, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated 11 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,064Jul 6, 2025Updated 7 months ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆432Dec 21, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated 11 months ago
- ☆225Oct 22, 2023Updated 2 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆300Feb 2, 2026Updated 2 weeks ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,258Dec 9, 2025Updated 2 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆534Jun 3, 2025Updated 8 months ago