yudasm / WHfB-o365-PhishletLinks
Updated o365 Evilginx phishlet for WHfB
☆27Updated last year
Alternatives and similar repositories for WHfB-o365-Phishlet
Users that are interested in WHfB-o365-Phishlet are comparing it to the libraries listed below
Sorting:
- sturdy-chainsaw☆57Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆132Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆172Updated 11 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆52Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆126Updated 4 months ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆35Updated 2 years ago
- ☆90Updated last week
- Public repo of some woking evilginx phishlets☆34Updated 7 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆119Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆186Updated 9 months ago
- Continuous password spraying tool☆186Updated 3 months ago
- ☆85Updated 4 months ago
- Parses Snaffler output file and generate beautified outputs.☆100Updated 4 months ago
- Azure Post Exploitation Framework☆199Updated 3 months ago
- Ready to go Phishing Platform☆41Updated 7 months ago
- Most Responder's configuration power in your hand.☆50Updated 4 months ago
- OAuth Device Code Phishing Toolkit☆60Updated last month
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- 🌩️ Collection of BloodHound queries for Azure☆70Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆156Updated 4 months ago
- ☆90Updated last month