Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing
☆58Mar 8, 2025Updated last year
Alternatives and similar repositories for EvilKnievelnoVNC
Users that are interested in EvilKnievelnoVNC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Jul 6, 2025Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆176Nov 11, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆88Mar 6, 2025Updated last year
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆27Jul 4, 2025Updated 10 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Ready to go Phishing Platform☆56Oct 15, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated last week
- Stage 0☆169Dec 18, 2024Updated last year
- Covert data exfiltration via DNS☆53Feb 8, 2025Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆189Feb 27, 2024Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 6 months ago
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- Protection against HTML smuggling attacks.☆102Jul 10, 2025Updated 10 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆85Apr 2, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆32Dec 18, 2025Updated 4 months ago
- Public repo of some woking evilginx phishlets☆41Nov 4, 2024Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Jan 9, 2025Updated last year
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆198Sep 19, 2025Updated 7 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 11 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 5 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- A delicious, but malicious SSL-VPN server 🌮☆266Feb 27, 2026Updated 2 months ago
- a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode exec…☆23Feb 25, 2023Updated 3 years ago