Ready to go Phishing Platform
☆57Oct 15, 2024Updated last year
Alternatives and similar repositories for MultiEvilnoVNC
Users that are interested in MultiEvilnoVNC are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 4 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 8 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 9 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆19Dec 18, 2024Updated last year
- Updated o365 Evilginx phishlet for WHfB☆90Mar 16, 2024Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- SystemGap - Maintenance Tools after privilege escalation☆47Jan 4, 2026Updated 2 months ago
- ☆72Aug 2, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- Modified Version of Evilginx ( Telegram Notifications )☆34Feb 25, 2026Updated last week
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Mar 8, 2025Updated 11 months ago
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 10 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Topic: The Swiss Army Knife of Java Exploitation☆21Feb 25, 2025Updated last year
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- ☆26Dec 21, 2025Updated 2 months ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆86Jun 14, 2020Updated 5 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago