Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
☆355Jun 18, 2024Updated last year
Alternatives and similar repositories for evilqr
Users that are interested in evilqr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,112Jun 19, 2024Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- evilginx3 + gophish☆1,976Jun 15, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- The state of the art network attack and monitoring framework.☆17Mar 5, 2018Updated 8 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- UAC Bypass By Abusing Kerberos Tickets☆506Aug 10, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆17Aug 12, 2016Updated 9 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆629Jun 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 6 months ago
- ☆290Jul 20, 2023Updated 2 years ago
- ☆91Aug 5, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆621Updated this week
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 31, 2026Updated last week
- Ready to go Phishing Platform☆1,122May 6, 2025Updated 11 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- ☆75Feb 4, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Bypassing UAC with SSPI Datagram Contexts☆465Sep 24, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆587Jan 20, 2026Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,014Jan 7, 2026Updated 3 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Python 3 script to dump/scrape/extract company employees from LinkedIn API☆580Feb 12, 2026Updated last month
- ☆307Mar 15, 2025Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆304Sep 7, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆551Jun 3, 2025Updated 10 months ago