Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
☆1,058Feb 18, 2026Updated 2 months ago
Alternatives and similar repositories for muraena
Users that are interested in muraena are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Jun 26, 2019Updated 6 years ago
- necromantic session control☆183Feb 17, 2026Updated 2 months ago
- Modlishka. Reverse Proxy.☆5,305Feb 12, 2026Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- Ready to go Phishing Platform☆1,130May 6, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- evilginx3 + gophish☆1,988Jun 15, 2024Updated last year
- A toolkit to attack Office365☆1,120Nov 6, 2020Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,755Jan 16, 2026Updated 3 months ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,566Oct 17, 2022Updated 3 years ago
- Payload Generation Framework☆1,977Aug 21, 2024Updated last year
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆812Aug 28, 2022Updated 3 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,300Aug 15, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated this week
- Extract credentials from lsass remotely☆2,198Mar 23, 2026Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,173Sep 29, 2021Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆4,432Updated this week
- Run shellcode from resource☆259Dec 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,084Mar 19, 2024Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,236Dec 27, 2023Updated 2 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,319Aug 19, 2019Updated 6 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆383Mar 13, 2025Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,675Jul 18, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,949Nov 19, 2025Updated 5 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,337Dec 6, 2023Updated 2 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆382Apr 28, 2020Updated 6 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,597Feb 5, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,277Updated this week
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 6 months ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,099Apr 13, 2026Updated 2 weeks ago
- Malicious Macro Generator☆832Apr 17, 2019Updated 7 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,220Aug 7, 2025Updated 8 months ago