☆276Apr 20, 2021Updated 5 years ago
Alternatives and similar repositories for judas
Users that are interested in judas are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆525Aug 11, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated network asset, email, and social media profile discovery and cataloguing.☆659Jan 6, 2022Updated 4 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆371Feb 23, 2024Updated 2 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆146Mar 3, 2023Updated 3 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,085Apr 5, 2022Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆945May 8, 2019Updated 7 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,059Feb 18, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆138Jul 13, 2017Updated 8 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 9 months ago
- ☆24Jun 29, 2020Updated 5 years ago
- Tool for extracting information from newly spawned processes☆779May 11, 2025Updated 11 months ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Phishing on Twitter☆254Jun 21, 2018Updated 7 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Aug 13, 2021Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆910Feb 26, 2021Updated 5 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,658Oct 11, 2018Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Script to steal passwords from ssh.☆491Dec 19, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆230May 10, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Search for categorized domain☆459Jan 15, 2019Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago