yudasm / WHfB-o365-Phishlet
Updated o365 Evilginx phishlet for WHfB
☆22Updated last year
Alternatives and similar repositories for WHfB-o365-Phishlet:
Users that are interested in WHfB-o365-Phishlet are comparing it to the libraries listed below
- sturdy-chainsaw☆57Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆127Updated last week
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆167Updated 10 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆100Updated 5 months ago
- Continuous password spraying tool☆181Updated last month
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆152Updated 3 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Parses Snaffler output file and generate beautified outputs.☆93Updated 3 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆49Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆145Updated last week
- ☆103Updated 7 months ago
- a port of privkit bof for havoc☆23Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆391Updated 4 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆112Updated last year
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆29Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- Azure Post Exploitation Framework☆197Updated last month
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆117Updated 2 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆183Updated 8 months ago
- C++ Reflective Assembly Loader☆24Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆113Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆176Updated 2 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆101Updated this week
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆108Updated last year
- Most Responder's configuration power in your hand.☆47Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 3 months ago