kgretzky / evilqrLinks
Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.
☆307Updated last year
Alternatives and similar repositories for evilqr
Users that are interested in evilqr are comparing it to the libraries listed below
Sorting:
- ☆300Updated last year
- Repo containing cracked red teaming tools.☆183Updated last month
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆424Updated last month
- Open-Source Phishing Toolkit☆204Updated 9 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆481Updated last year
- ☆298Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- Command & Control-Framework created for collaboration in python3☆318Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆392Updated 6 months ago
- Generate FUD backdoors☆249Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆131Updated 11 months ago
- ☆159Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆453Updated 4 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated 11 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- PDF dropper Red Team Scenairos☆213Updated 11 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆247Updated last month
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- PowerShell Obfuscator☆179Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆411Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆172Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆111Updated last year
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆338Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated 10 months ago
- ☆122Updated last year
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆306Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 11 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year