warhorse / docker-evilginx2Links
☆20Updated last year
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- sturdy-chainsaw☆57Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 3 months ago
- Hiding your infrastructure from the boys in blue.☆22Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆51Updated 2 weeks ago
- ☆109Updated 7 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆51Updated 4 months ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆15Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆172Updated 11 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- ☆59Updated 8 months ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆39Updated 8 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- ☆69Updated last week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- A user enumeration tool for Slack.☆28Updated 11 months ago
- ☆77Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆57Updated 3 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated 4 months ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆18Updated last year