muraenateam / necrobrowser
necromantic session control
☆160Updated 4 months ago
Alternatives and similar repositories for necrobrowser:
Users that are interested in necrobrowser are comparing it to the libraries listed below
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆123Updated 9 months ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆150Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- Hiding GoPhish from the boys in blue☆179Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- An OSINT employee/username enumeration tool☆62Updated 2 months ago
- ☆150Updated last year
- Method to bypass Google's JS security when using MITM phishing tools☆60Updated last year
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- ☆135Updated last year
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- sturdy-chainsaw☆57Updated last year
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- ☆161Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆340Updated 4 years ago
- Simple script that checks a domain for email protections☆33Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- ☆291Updated last year
- Lure - User Recon Automation for GoPhish☆162Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆476Updated 4 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆166Updated 9 months ago
- Password list generator for password spraying - prebaked with goodies☆103Updated 2 years ago
- Roast in the Middle☆290Updated 4 months ago
- Fly into Gophish with One Click (Infra Automation)☆47Updated 2 years ago
- Your go-to resource for all things OSINT☆165Updated last year
- ☆30Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆98Updated 3 years ago