☆275Apr 20, 2021Updated 4 years ago
Alternatives and similar repositories for judas
Users that are interested in judas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated network asset, email, and social media profile discovery and cataloguing.☆657Jan 6, 2022Updated 4 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆142Mar 3, 2023Updated 3 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,082Apr 5, 2022Updated 3 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,050Feb 18, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆139Jul 13, 2017Updated 8 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 7 months ago
- ☆24Jun 29, 2020Updated 5 years ago
- Tool for extracting information from newly spawned processes☆777May 11, 2025Updated 10 months ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆909Feb 26, 2021Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Search for categorized domain☆456Jan 15, 2019Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago