Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing
☆55Mar 8, 2025Updated last year
Alternatives and similar repositories for EvilKnievelnoVNC
Users that are interested in EvilKnievelnoVNC are comparing it to the libraries listed below
Sorting:
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 8 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆81Apr 2, 2025Updated 11 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆40Dec 7, 2025Updated 3 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆57Dec 12, 2022Updated 3 years ago
- ☆147Nov 6, 2025Updated 4 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Mar 27, 2023Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- Cobalt Strike BOF☆43Dec 10, 2025Updated 2 months ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆30Dec 18, 2025Updated 2 months ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated last month
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆77Feb 24, 2026Updated last week
- ☆38Mar 28, 2025Updated 11 months ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- Execute shellcode via ASPNET compiler