Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
☆1,052Feb 18, 2026Updated last month
Alternatives and similar repositories for muraena
Users that are interested in muraena are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Jun 26, 2019Updated 6 years ago
- necromantic session control☆182Feb 17, 2026Updated last month
- Modlishka. Reverse Proxy.☆5,296Feb 12, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Ready to go Phishing Platform☆1,122May 6, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- evilginx3 + gophish☆1,976Jun 15, 2024Updated last year
- A toolkit to attack Office365☆1,118Nov 6, 2020Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,384May 22, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,744Jan 16, 2026Updated 2 months ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,561Oct 17, 2022Updated 3 years ago
- Payload Generation Framework☆1,982Aug 21, 2024Updated last year
- Process Injection☆769Oct 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆810Aug 28, 2022Updated 3 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,297Aug 15, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Extract credentials from lsass remotely☆2,190Mar 23, 2026Updated 2 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- Run shellcode from resource☆259Dec 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,081Mar 19, 2024Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,236Dec 27, 2023Updated 2 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,314Aug 19, 2019Updated 6 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆382Mar 13, 2025Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,932Nov 19, 2025Updated 4 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,571Feb 5, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 3 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 6 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,098Mar 25, 2026Updated 2 weeks ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,218Aug 7, 2025Updated 8 months ago