puzzlepeaches / sneaky_gophishView external linksLinks
Hiding GoPhish from the boys in blue
☆201Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for sneaky_gophish
Users that are interested in sneaky_gophish are comparing it to the libraries listed below
Sorting:
- Open-Source Phishing Toolkit☆18May 23, 2021Updated 4 years ago
- evilginx3 + gophish☆1,953Jun 15, 2024Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆342Jun 6, 2022Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,083Jun 10, 2024Updated last year
- Infrastructure Automation☆356Apr 12, 2024Updated last year
- ☆415Apr 28, 2021Updated 4 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ☆129Mar 1, 2023Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 6 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆933Mar 28, 2025Updated 10 months ago
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆499Feb 3, 2022Updated 4 years ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated 3 weeks ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆532Nov 19, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆86Mar 19, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆565Jun 5, 2023Updated 2 years ago
- ☆714Mar 22, 2024Updated last year
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Mar 12, 2025Updated 11 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆243Nov 15, 2025Updated 3 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated last month
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆260Feb 21, 2025Updated 11 months ago
- LDAP Querying without the Suck☆110Nov 9, 2024Updated last year
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles☆418Apr 6, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago