☆276Apr 20, 2021Updated 4 years ago
Alternatives and similar repositories for judas
Users that are interested in judas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆526Aug 11, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated network asset, email, and social media profile discovery and cataloguing.☆660Jan 6, 2022Updated 4 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆146Mar 3, 2023Updated 3 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,083Apr 5, 2022Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,056Feb 18, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆138Jul 13, 2017Updated 8 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 8 months ago
- ☆24Jun 29, 2020Updated 5 years ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 11 months ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Phishing on Twitter☆252Jun 21, 2018Updated 7 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Aug 13, 2021Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆909Feb 26, 2021Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,652Oct 11, 2018Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Search for categorized domain☆458Jan 15, 2019Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago