drk1wi / Modlishka
Modlishka. Reverse Proxy.
☆4,946Updated 11 months ago
Alternatives and similar repositories for Modlishka:
Users that are interested in Modlishka are comparing it to the libraries listed below
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆969Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12,765Updated 2 months ago
- A Tool for Domain Flyovers☆5,735Updated 2 years ago
- Monitor linux processes without root permissions☆5,302Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,456Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,188Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,225Updated 5 months ago
- A swiss army knife for pentesting networks☆8,643Updated last year
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,429Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,728Updated 2 weeks ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,573Updated 5 years ago
- File upload vulnerability scanner and exploitation tool.☆3,181Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,627Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,282Updated 6 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,775Updated 4 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,353Updated 4 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,680Updated last month
- A Workflow Engine for Offensive Security☆5,538Updated last month
- HTTP parameter discovery suite.☆5,528Updated last month
- Mimikatz implementation in pure Python☆2,977Updated last month
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,808Updated last year
- Next generation web scanner☆5,794Updated 8 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,146Updated 6 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,118Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,370Updated 9 months ago
- Striker is an offensive information and vulnerability scanner.☆2,262Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,200Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,169Updated 6 months ago
- Web application fuzzer☆6,120Updated 7 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,096Updated 11 months ago