atexio / mercureView external linksLinks
Mercure is a tool for security managers who want to train their colleague to phishing.
☆269Mar 7, 2021Updated 4 years ago
Alternatives and similar repositories for mercure
Users that are interested in mercure are comparing it to the libraries listed below
Sorting:
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,405Jan 9, 2024Updated 2 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 5 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Mar 30, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆630Oct 16, 2018Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- online port scan scraper☆1,120Aug 7, 2023Updated 2 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 4 months ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Nov 3, 2019Updated 6 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆952Jan 12, 2023Updated 3 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- An exploit for Apache Struts CVE-2017-9805☆249Nov 7, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Aug 23, 2021Updated 4 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Jul 27, 2020Updated 5 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago