yudasm / WHfB-o365-PhishletView external linksLinks
Updated o365 Evilginx phishlet for WHfB
☆89Mar 16, 2024Updated last year
Alternatives and similar repositories for WHfB-o365-Phishlet
Users that are interested in WHfB-o365-Phishlet are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 10 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆25Feb 27, 2025Updated 11 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 7 months ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆97Oct 18, 2025Updated 3 months ago
- ☆65Jan 2, 2024Updated 2 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- ☆118Nov 21, 2024Updated last year
- ☆50Jun 4, 2025Updated 8 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Dec 1, 2025Updated 2 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆17Jul 3, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 3 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆114Oct 6, 2025Updated 4 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆104Updated this week
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆183Jan 17, 2026Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- NSecSoftBYOVD POC☆55Updated this week
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 6 months ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 9 months ago
- Free o365.yaml and updated version of evilginx with all bypass methods included.☆23Nov 27, 2024Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆36Dec 12, 2025Updated 2 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- ☆48Dec 21, 2025Updated last month
- ☆186Nov 13, 2025Updated 3 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- ☆137Nov 17, 2025Updated 2 months ago