warhorse / docker-evilginx2Links
☆20Updated 2 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- sturdy-chainsaw☆69Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 4 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆141Updated 6 months ago
- Easy red team phishing with Puppeteer☆133Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- ☆109Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 11 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- ☆57Updated 8 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Updated last month
- C2 Automation using Linode☆85Updated 3 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Updated 3 years ago
- Updated o365 Evilginx phishlet for WHfB☆89Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- ☆105Updated 2 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Updated 3 weeks ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 6 months ago
- Simulation and red team Phishing Framework☆161Updated last week
- A little cheatsheet for NetExec☆32Updated last year
- Ready to go Phishing Platform☆57Updated last year
- Hiding your infrastructure from the boys in blue.☆23Updated 4 years ago
- Your Skyfall Infrastructure Pack☆90Updated last week