Public repo of some woking evilginx phishlets
☆39Nov 4, 2024Updated last year
Alternatives and similar repositories for evilginx-collection
Users that are interested in evilginx-collection are comparing it to the libraries listed below
Sorting:
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Updated o365 Evilginx phishlet for WHfB☆91Mar 16, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆136Aug 23, 2025Updated 6 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- ☆38Apr 15, 2025Updated 11 months ago
- ☆18Jun 25, 2024Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- Lateral Movement Bof with MSI ODBC Driver Install☆147Sep 30, 2025Updated 5 months ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- COFF and BOF Loader written in Nim☆174Aug 1, 2022Updated 3 years ago
- ☆26Feb 11, 2025Updated last year
- Donut generator in rust.☆28Feb 17, 2022Updated 4 years ago
- Unused DLL hollowing PoC in Nim☆17Jan 31, 2022Updated 4 years ago
- @echo off title Activate Windows 7 / 8 / 8.1 / 10 for FREE!&cls&echo =====================================&echo #Copyright: MSGuides.com&…☆10Oct 22, 2020Updated 5 years ago
- Application to get the information from EMV based Credit or Debit Card.☆18Feb 11, 2016Updated 10 years ago
- ☆42Jan 13, 2023Updated 3 years ago
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- ☆41Feb 20, 2025Updated last year
- Evilginx3 Phishlet Templates☆24Dec 18, 2023Updated 2 years ago
- EvilPunch is a reverse proxy framework intended for authorized red teaming, adversary / Phishing emulation, and educational security rese…☆17Nov 3, 2025Updated 4 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated 2 months ago
- Enumerate the Domain for Readable and Writable Shares☆23Nov 14, 2025Updated 4 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆195Feb 16, 2026Updated last month
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆57Nov 18, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago