NSEcho / lateralus
Lateralus is terminal based phishing campaign tool
☆26Updated 2 years ago
Alternatives and similar repositories for lateralus:
Users that are interested in lateralus are comparing it to the libraries listed below
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- ☆19Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆14Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Subdomain Scan (knockpy) in Python3☆11Updated 4 years ago
- Host IDS for desktop users☆11Updated 4 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Updated 3 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Provides access to libhashcat☆30Updated last year
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆33Updated 3 weeks ago
- ☆25Updated last year