NSEcho / lateralus
Lateralus is terminal based phishing campaign tool
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for lateralus
- Phishing Reverse Proxy with MFA bypass☆16Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆14Updated last week
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Simple Tool for webhacking☆10Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆32Updated 5 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- 🎞 lan and wifi interception. Gnu/Linux Version☆16Updated 4 years ago
- Man in the Browser Framework☆39Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- HTTP based framework for building command and control components for remote access trojans☆12Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 3 years ago