optiv / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆12Updated 4 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆44Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- pysnaffler☆102Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 10 months ago
- Custom queries list for BloodHound☆29Updated 2 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆29Updated 6 months ago
- ☆44Updated last year
- ☆53Updated 3 months ago
- ☆33Updated 2 months ago
- ☆28Updated 2 years ago
- A repo of scripts I find helpful for daily tasks.☆31Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆35Updated 3 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- A Python POC for CRED1 over SOCKS5☆158Updated 11 months ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- ☆73Updated 3 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆43Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆110Updated 2 months ago
- Find Inbound Email Domains☆35Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆72Updated 5 months ago
- Get Fine Grained Password Policy☆74Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆34Updated 6 months ago