warhorse / docker-evilginx2
☆19Updated last year
Alternatives and similar repositories for docker-evilginx2:
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
- sturdy-chainsaw☆57Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 2 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆69Updated 6 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 2 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆56Updated 2 months ago
- ☆108Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆167Updated 10 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆49Updated 3 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- ☆58Updated last week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- Script to perform some hashcracking logic automagically☆71Updated 11 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆54Updated last month
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆117Updated 2 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆80Updated 2 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- Custom queries list for BloodHound☆26Updated 7 months ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- Public repo of some woking evilginx phishlets☆32Updated 5 months ago
- A Tool for Domain Flyovers - my version of michenriksen's aquatone☆10Updated last year