NSEcho / lateralusLinks
Lateralus is terminal based phishing campaign tool
☆27Updated 2 years ago
Alternatives and similar repositories for lateralus
Users that are interested in lateralus are comparing it to the libraries listed below
Sorting:
- Phishing Reverse Proxy with MFA bypass☆17Updated 2 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Updated last month
- Golang Implant & Post-Exploitation Framework☆60Updated 2 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 5 years ago
- The best way to send emails in Go.☆12Updated 4 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- Shellcode process injector☆28Updated 5 years ago
- ☆20Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Updated 3 years ago
- Man in the Browser Framework☆48Updated last year
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆32Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Antiscan.me automatization script☆29Updated last year
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago