webdevvx / evilginx-phishletsLinks
Reverse proxy implementation to any kind of phishlets. Creating evilginx phishlets that can capture both users'credentials and users'cookies developer: https://t.me/profcodes
☆17Updated 7 months ago
Alternatives and similar repositories for evilginx-phishlets
Users that are interested in evilginx-phishlets are comparing it to the libraries listed below
Sorting:
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆977Updated 7 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆442Updated 6 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆614Updated 11 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆446Updated last month
- C2 infrastructure over Microsoft Teams.☆728Updated 10 months ago
- Assess the security of your Active Directory with few or all privileges.☆336Updated 6 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆429Updated 2 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆141Updated 3 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆479Updated 6 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆466Updated 9 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 8 months ago
- This repo is about Active Directory Advanced Threat Hunting☆646Updated 9 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆625Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆333Updated 10 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆624Updated last month
- Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence☆386Updated last month
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆522Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆772Updated 2 weeks ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆294Updated last month
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,384Updated last week
- Lab used for workshop and CTF☆382Updated last week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆570Updated last month
- Hardening Active Directory version 2☆362Updated 3 weeks ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆404Updated last month
- An automated NMAP python script☆48Updated 9 months ago
- Phishing with a fake reCAPTCHA☆628Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆210Updated last month
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆121Updated 3 weeks ago
- Send phishing messages and attachments to Microsoft Teams users☆1,096Updated last year