Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆11Mar 22, 2021Updated 4 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- A simple tool to find dangling CNAMEs☆17Dec 7, 2023Updated 2 years ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 5 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- ☆14Aug 19, 2023Updated 2 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- ☆18Sep 24, 2024Updated last year
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆103Jan 26, 2026Updated last month
- WNF Code Execution Library Using C#☆110May 18, 2020Updated 5 years ago
- Cloud Related Projects☆11Oct 8, 2024Updated last year
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆20Nov 13, 2025Updated 4 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆52Jul 18, 2025Updated 8 months ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- PACU - Phishing Automation & Campaigning Utility☆37Nov 9, 2022Updated 3 years ago
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- ☆14Sep 27, 2023Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Simple Python web server for HTTP request and browser fingerprinting with whitelist and callback functionality.☆25Apr 18, 2023Updated 2 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- A technical walkthrough for extracting authentication keys and either emulating or cloning MIFARE classic 1k cards.☆26Apr 29, 2025Updated 10 months ago
- CuteRAT is a stealthy remote access tool without any dependencies☆17Sep 12, 2023Updated 2 years ago
- ☆83Nov 1, 2023Updated 2 years ago
- Linux Shared Library to Shellcode Loader☆88Feb 15, 2026Updated last month
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 6 months ago
- ☆16May 20, 2022Updated 3 years ago