NSEcho / lateralus
Lateralus is terminal based phishing campaign tool
☆25Updated last year
Alternatives and similar repositories for lateralus:
Users that are interested in lateralus are comparing it to the libraries listed below
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆60Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆21Updated 6 months ago
- Multithreaded spraying of a password on all accounts of a domain.☆18Updated last month
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Subdomain Scan (knockpy) in Python3☆11Updated 4 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- 🐺 Command-line application and golang client library for hunter.io☆37Updated 4 months ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆45Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 months ago
- Phishing Reverse Proxy with MFA bypass☆16Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- ☆19Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- ☆51Updated 3 years ago