drk1wi / ModlishkaLinks
Modlishka. Reverse Proxy.
☆5,142Updated 4 months ago
Alternatives and similar repositories for Modlishka
Users that are interested in Modlishka are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,882Updated 8 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,388Updated 5 months ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,024Updated 10 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,154Updated 2 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,775Updated 4 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,470Updated this week
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,241Updated 3 months ago
- File upload vulnerability scanner and exploitation tool.☆3,260Updated 5 months ago
- A Workflow Engine for Offensive Security☆5,903Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,461Updated 2 weeks ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,192Updated 5 years ago
- A Tool for Domain Flyovers☆5,854Updated 3 years ago
- Phishing Campaign Toolkit☆2,447Updated 2 months ago
- Adversary Emulation Framework☆10,045Updated 3 weeks ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,869Updated last year
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,429Updated last year
- Open-Source Phishing Toolkit☆13,169Updated last year
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,586Updated last week
- Monitor linux processes without root permissions☆5,673Updated 2 years ago
- Next generation web scanner☆6,108Updated last week
- A swiss army knife for pentesting networks☆8,932Updated last year
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,709Updated 11 months ago
- NSE script based on Vulners.com API☆3,342Updated last week
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,391Updated last year
- Automated Mass Exploiter☆5,161Updated 2 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,449Updated 5 months ago
- Attack Surface Management Platform☆9,112Updated last week
- Weaponized web shell☆3,388Updated last week
- In-depth attack surface mapping and asset discovery☆13,625Updated last month
- Windows Exploit Suggester - Next Generation☆4,630Updated this week