CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
☆293Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for CredPhish
Users that are interested in CredPhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆95Jul 3, 2021Updated 4 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,580Nov 9, 2021Updated 4 years ago
- ☆420Apr 28, 2021Updated 5 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆874Mar 20, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆134Dec 19, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- DCSync Attack from Outside using Impacket☆116May 2, 2022Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- ☆1,683Apr 14, 2025Updated last year
- Get file less command execution for lateral movement.☆637Jun 3, 2022Updated 3 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆270Mar 18, 2021Updated 5 years ago
- An Office365 User Attack Tool☆652Mar 19, 2024Updated 2 years ago
- Small and convenient C2 tool for Windows targets☆614Mar 8, 2022Updated 4 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆438Jan 8, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆882Mar 29, 2021Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago
- c++ fully undetected shellcode launcher ;)☆978Jun 11, 2021Updated 4 years ago
- Retrieve LAPS password from LDAP☆442Feb 17, 2021Updated 5 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆423May 21, 2022Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,174Sep 29, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- "Golden" certificates☆717Aug 17, 2024Updated last year
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆320Jul 1, 2021Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆181Aug 4, 2021Updated 4 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆443Feb 16, 2026Updated 2 months ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆749Feb 24, 2026Updated 2 months ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago