Ready to go Phishing Platform
☆58Oct 15, 2024Updated last year
Alternatives and similar repositories for MultiEvilnoVNC
Users that are interested in MultiEvilnoVNC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Demo code showing how to use Java's StructuredTaskScope☆12Dec 10, 2025Updated 4 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆57Mar 8, 2025Updated last year
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 4 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deploy Google Hipster Shop microservices demo on Azure Kubernetes Service using Terraform and Skaffold, and monitor it with Prometheus an…☆16Aug 20, 2024Updated last year
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆39Jan 3, 2026Updated 3 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Docker best practices☆24Oct 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 10 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆72Aug 2, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆13Mar 5, 2024Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 7 months ago
- A short scraper looking for a POC of CVE-2024-49112☆13Dec 16, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Modified Version of Evilginx ( Telegram Notifications )☆41Feb 25, 2026Updated last month
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 months ago
- Los siguientes 1000 scripts de la web jesusninoc.com☆14Jan 16, 2019Updated 7 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- ☆19Dec 18, 2024Updated last year
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆68Dec 25, 2025Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Dec 7, 2025Updated 4 months ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- ☆186Oct 21, 2025Updated 5 months ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 9 months ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- ☆10Oct 11, 2020Updated 5 years ago