evilsocket / nyxLinks
Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.
☆112Updated 3 months ago
Alternatives and similar repositories for nyx
Users that are interested in nyx are comparing it to the libraries listed below
Sorting:
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- External Playbooks for Public Access☆40Updated 8 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆105Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆177Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆147Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- Rebuild of portspoof in GO with additional features.☆21Updated this week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated last week
- A delicious, but malicious SSL-VPN server 🌮☆252Updated 3 weeks ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆82Updated 5 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 6 months ago
- Protection against HTML smuggling attacks.☆99Updated 3 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆147Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 4 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 10 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 3 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 5 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆38Updated 4 months ago
- Vast.ai Password Kracking☆87Updated 4 months ago
- Get root via TTY / TIOCSTI stuffing☆77Updated 5 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆197Updated last week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆96Updated 7 months ago
- Proximity is a MCP security scanner powered with NOVA☆53Updated last month