Lateralus is terminal based phishing campaign tool
☆28Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for lateralus
Users that are interested in lateralus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- proxphish is a advanced phishing tool☆16Jan 6, 2021Updated 5 years ago
- Easy phishing environment builder (Red Team)☆16Mar 26, 2026Updated 3 weeks ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Oct 27, 2022Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ☆10Mar 30, 2015Updated 11 years ago
- Use SQL to instantly query Prometheus metrics, alerts, labels and more. Open source CLI. No DB required.☆20Updated this week
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A phishing tool.☆63Oct 9, 2022Updated 3 years ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- ☆31Apr 12, 2026Updated last week
- ☆24Mar 25, 2024Updated 2 years ago
- This repo contains deobfuscated files of the Redline malware code which was behind the The recent Github Account hacks and stealing sensi…☆14Sep 18, 2024Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆53Sep 4, 2021Updated 4 years ago
- Hacking your car like in movies☆17Aug 22, 2022Updated 3 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Apr 10, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Use SQL to instantly query Jira. Open source CLI. No DB required.☆25Apr 10, 2026Updated last week
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Apr 10, 2026Updated last week
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- 用于网站(HTTP)自动化判断开放和网页快照拍摄☆12Jan 25, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Second Edition Metasploit For Termux☆21Apr 9, 2026Updated last week
- Exploits for TRENDNet routers☆14Apr 21, 2020Updated 5 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- Turn table into subfigure. More or less a hack atm, easy to incorporate to org-mode though☆21Feb 13, 2021Updated 5 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year