evilsocket / nyxLinks
Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.
☆114Updated 3 months ago
Alternatives and similar repositories for nyx
Users that are interested in nyx are comparing it to the libraries listed below
Sorting:
- Rebuild of portspoof in GO with additional features.☆24Updated 3 weeks ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated last week
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 11 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆113Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 7 months ago
- Protection against HTML smuggling attacks.☆99Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- Execute shellcode via ASPNET compiler☆58Updated last month
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 5 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆262Updated 6 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆106Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated 11 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 5 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆20Updated 6 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆415Updated last month