warhorse / docker-evilginx2Links
☆20Updated last year
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆30Updated last week
- sturdy-chainsaw☆67Updated 2 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆136Updated 10 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 3 years ago
- ☆109Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆132Updated 3 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 4 months ago
- Ready to go Phishing Platform☆56Updated last year
- Updated o365 Evilginx phishlet for WHfB☆86Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 2 months ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Discord C2 Profile for Mythic☆33Updated 9 months ago
- ☆98Updated 2 weeks ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- ☆99Updated 2 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- A small script that automates Entra ID persistence with Windows Hello For Business key☆65Updated 9 months ago
- ☆40Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆232Updated last month
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 9 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆124Updated 3 years ago