warhorse / docker-evilginx2Links
☆20Updated 2 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- sturdy-chainsaw☆68Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆30Updated last week
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 4 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Updated 11 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆259Updated last month
- Easy red team phishing with Puppeteer☆133Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- ☆109Updated last year
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Updated 4 years ago
- ☆101Updated 2 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Updated 2 weeks ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Custom queries list for BloodHound☆31Updated 6 months ago
- A DMARC scanning and parsing tool.☆33Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆92Updated 5 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated 11 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆139Updated 5 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 10 months ago