tokyoneon / CredPhish
CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.
☆293Updated 3 years ago
Alternatives and similar repositories for CredPhish:
Users that are interested in CredPhish are comparing it to the libraries listed below
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆299Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆431Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆325Updated 5 months ago
- Assist reverse tcp shells in post-exploration tasks☆218Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- Basic C2 Server☆188Updated 3 years ago
- Hiding GoPhish from the boys in blue☆180Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆353Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆420Updated 2 years ago
- ☆192Updated 5 years ago
- Maximizing BloodHound. Max is a good boy.☆511Updated 2 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆229Updated 3 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆363Updated 5 months ago
- Password spraying tool and Bloodhound integration☆229Updated 3 months ago
- An Office365 User Attack Tool☆632Updated last year
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- Powershell crazy and sometimes diabolic scripts☆155Updated 4 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆387Updated last year
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆169Updated 3 weeks ago
- scan for NTLM directories☆357Updated 9 months ago
- Kerberoast attack -pure python-☆427Updated last year
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆214Updated 3 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆346Updated this week
- Roast in the Middle☆290Updated 4 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆480Updated 9 months ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- Dumping LAPS from Python☆266Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago
- ☆198Updated 5 years ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago