Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
☆360Jun 18, 2024Updated last year
Alternatives and similar repositories for evilqr
Users that are interested in evilqr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Jul 27, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- evilginx3 + gophish☆1,990Jun 15, 2024Updated last year
- Collection of random RedTeam scripts.☆214Mar 8, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Slides and videos from talks given at cons☆26Jun 19, 2025Updated 11 months ago
- UAC Bypass By Abusing Kerberos Tickets☆509Aug 10, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆631Jun 25, 2024Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆113Sep 17, 2025Updated 8 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆33Aug 16, 2023Updated 2 years ago
- ☆91Aug 5, 2023Updated 2 years ago
- ☆293Jul 20, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,080Oct 6, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆636Apr 2, 2026Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 31, 2026Updated last month
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Ready to go Phishing Platform☆1,137May 6, 2025Updated last year
- ☆75Feb 4, 2024Updated 2 years ago
- Bypassing UAC with SSPI Datagram Contexts☆467Sep 24, 2023Updated 2 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Escalate Service Account To LocalSystem via Kerberos☆405Sep 14, 2023Updated 2 years ago
- A C# port from Invoke-GhostTask☆121Jan 5, 2024Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆598Jan 20, 2026Updated 3 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,026Jan 7, 2026Updated 4 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 11 months ago
- Python 3 script to dump/scrape/extract company employees from LinkedIn API☆589Apr 18, 2026Updated last month
- ☆308Mar 15, 2025Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆744May 19, 2023Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆307Sep 7, 2023Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆563Jun 3, 2025Updated 11 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆275Jan 18, 2023Updated 3 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,255Feb 25, 2023Updated 3 years ago
- ☆224Mar 10, 2024Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆876Feb 3, 2024Updated 2 years ago