muraenateam / muraenaView external linksLinks
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
☆1,044Updated this week
Alternatives and similar repositories for muraena
Users that are interested in muraena are comparing it to the libraries listed below
Sorting:
- Modlishka. Reverse Proxy.☆5,264Updated this week
- Ready to go Phishing Platform☆1,101May 6, 2025Updated 9 months ago
- evilginx3 + gophish☆1,953Jun 15, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- A toolkit to attack Office365☆1,115Nov 6, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,594Jul 10, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,722Jan 16, 2026Updated last month
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- Payload Generation Framework☆1,960Aug 21, 2024Updated last year
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,301Aug 15, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,867Aug 18, 2023Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,169Sep 29, 2021Updated 4 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,073Mar 19, 2024Updated last year
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Process Injection☆766Oct 24, 2021Updated 4 years ago
- Extract credentials from lsass remotely☆2,178Dec 24, 2025Updated last month
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,302Aug 19, 2019Updated 6 years ago
- A collaborative, multi-platform, red teaming framework☆4,296Feb 10, 2026Updated last week
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,233Dec 27, 2023Updated 2 years ago
- Comprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!☆380Mar 13, 2025Updated 11 months ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,318Dec 6, 2023Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,606Jul 18, 2024Updated last year
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆610Feb 16, 2023Updated 3 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Apr 28, 2020Updated 5 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,516Feb 5, 2026Updated last week
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,903Nov 19, 2025Updated 2 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,258Dec 9, 2025Updated 2 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- Azure JWT Token Manipulation Toolset☆713Dec 6, 2024Updated last year
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆779Aug 26, 2025Updated 5 months ago