warhorse / docker-evilginx2
☆18Updated last year
Alternatives and similar repositories for docker-evilginx2:
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
- sturdy-chainsaw☆53Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆11Updated 3 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆25Updated this week
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆107Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆40Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆35Updated 3 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated this week
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 8 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- Custom queries list for BloodHound☆23Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆163Updated 7 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆97Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- C2 Automation using Linode☆79Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 3 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆106Updated last week
- Artifact monitoring that ensures fairplay☆75Updated last week
- ☆40Updated this week
- Next generation fireprox AWS API endpoint creation utility.☆49Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆49Updated 6 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- ☆47Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆55Updated last month