Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing
☆55Mar 8, 2025Updated last year
Alternatives and similar repositories for EvilKnievelnoVNC
Users that are interested in EvilKnievelnoVNC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆175Nov 11, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 8 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 9 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Ready to go Phishing Platform☆57Oct 15, 2024Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆184Feb 27, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 9 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 8 months ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated 11 months ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆215Jan 30, 2025Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- ☆14Sep 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Jan 9, 2025Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆57Dec 12, 2022Updated 3 years ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆193Sep 19, 2025Updated 6 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- A delicious, but malicious SSL-VPN server 🌮☆266Feb 27, 2026Updated last month
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 3 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago