warhorse / docker-evilginx2
☆19Updated last year
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- sturdy-chainsaw☆57Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 2 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆168Updated 11 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆50Updated 4 months ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆18Updated last year
- A user enumeration tool for Slack.☆28Updated 11 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated 11 months ago
- A Tool for Domain Flyovers - my version of michenriksen's aquatone☆10Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- ☆64Updated 2 weeks ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆57Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 8 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- Public repo of some woking evilginx phishlets☆32Updated 6 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 5 months ago
- Your Skyfall Infrastructure Pack☆69Updated this week
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- Open-Source Phishing Toolkit☆19Updated 3 years ago