Hiding GoPhish from the boys in blue
☆201Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for sneaky_gophish
Users that are interested in sneaky_gophish are comparing it to the libraries listed below
Sorting:
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- evilginx3 + gophish☆1,961Jun 15, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆341Jun 6, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- Infrastructure Automation☆357Apr 12, 2024Updated last year
- ☆418Apr 28, 2021Updated 4 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆534Aug 1, 2022Updated 3 years ago
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 5 months ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆609Dec 9, 2025Updated 3 months ago
- ☆128Mar 1, 2023Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Aug 15, 2025Updated 6 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆933Mar 2, 2026Updated last week
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆497Feb 3, 2022Updated 4 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,369Oct 27, 2023Updated 2 years ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Mar 19, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆568Jun 5, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- ☆716Mar 22, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,371Oct 22, 2025Updated 4 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆360Dec 13, 2025Updated 2 months ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Mar 12, 2025Updated 11 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆245Nov 15, 2025Updated 3 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- LDAP Querying without the Suck☆110Nov 9, 2024Updated last year
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆417Apr 6, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago