evilsocket / nyxLinks
Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.
☆109Updated last month
Alternatives and similar repositories for nyx
Users that are interested in nyx are comparing it to the libraries listed below
Sorting:
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆66Updated last week
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 6 months ago
- Rebuild of portspoof in GO with additional features.☆19Updated last week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆232Updated 2 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆77Updated 5 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆81Updated 3 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆62Updated 2 weeks ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 3 months ago
- ☆42Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 2 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 10 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.☆240Updated last week
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- A delicious, but malicious SSL-VPN server 🌮☆251Updated 2 weeks ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆36Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆94Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated last week
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆88Updated last week