warhorse / docker-evilginx2
☆17Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for docker-evilginx2
- sturdy-chainsaw☆52Updated last year
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆34Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆10Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 6 months ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆36Updated 2 months ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆91Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 7 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆90Updated 8 months ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆47Updated 4 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆40Updated 2 years ago
- ☆103Updated 2 weeks ago
- ☆43Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆13Updated 3 years ago
- Next generation fireprox AWS API endpoint creation utility.☆45Updated last year
- Windows Post-Exploitation tools wrapper☆11Updated 5 months ago
- ☆46Updated 2 years ago
- ☆51Updated last year
- Most Responder's configuration power in your hand.☆36Updated 8 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated this week
- Red Team "Drop and Run" NAC (802.1x) Bypass☆69Updated last year