warhorse / docker-evilginx2
☆16Updated 9 months ago
Related projects: ⓘ
- sturdy-chainsaw☆49Updated last year
- Microsoft365 Device Code Phishing Framework☆33Updated 3 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 4 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆10Updated 2 years ago
- Hiding your infrastructure from the boys in blue.☆20Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 9 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆32Updated 9 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- Slides and videos from talks given at cons☆10Updated 2 months ago
- C2 Automation using Linode☆78Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Artifact monitoring that ensures fairplay☆66Updated 11 months ago
- ☆46Updated 2 years ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆63Updated 3 months ago
- ☆90Updated last week
- Proof of concept: using a Cloudflare worker for AITM attacks☆85Updated 6 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Notification webhook for GoPhish☆51Updated 3 months ago
- Webshell agent in aspx and php☆16Updated this week
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆23Updated 4 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆45Updated 2 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆72Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆89Updated 3 months ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 6 months ago
- ☆50Updated 11 months ago