Updated o365 Evilginx phishlet for WHfB
☆90Mar 16, 2024Updated last year
Alternatives and similar repositories for WHfB-o365-Phishlet
Users that are interested in WHfB-o365-Phishlet are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Apr 16, 2025Updated 10 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆25Feb 27, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- ☆64Jan 2, 2024Updated 2 years ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆100Oct 18, 2025Updated 4 months ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- ☆121Nov 21, 2024Updated last year
- ☆50Jun 4, 2025Updated 9 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆17Jul 3, 2024Updated last year
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆116Oct 6, 2025Updated 5 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆107Updated this week
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆188Jan 17, 2026Updated last month
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆609Dec 9, 2025Updated 3 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Red Team Collaboration Infrastructure☆98Apr 24, 2025Updated 10 months ago
- Free o365.yaml and updated version of evilginx with all bypass methods included.☆23Nov 27, 2024Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 3 weeks ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- ☆49Dec 21, 2025Updated 2 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆189Nov 13, 2025Updated 3 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago