muraenateam / necrobrowser
necromantic session control
☆158Updated 2 months ago
Alternatives and similar repositories for necrobrowser:
Users that are interested in necrobrowser are comparing it to the libraries listed below
- Phishlets for Evilginx2 (MITM proxy Framework)☆148Updated 4 years ago
- Method to bypass Google's JS security when using MITM phishing tools☆59Updated last year
- Open-Source Collection of Social Engineering Pretexts☆133Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- PACU - Phishing Automation & Campaigning Utility☆40Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆48Updated last year
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆96Updated 3 years ago
- Hiding GoPhish from the boys in blue☆174Updated 2 years ago
- Your go-to resource for all things OSINT☆161Updated 10 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆111Updated 7 months ago
- Simple & Customizable DNS Data Exfiltrator☆107Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆59Updated 3 years ago
- ☆149Updated last year
- Malware vulnerability intel tool for third-party attackers☆115Updated 3 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆20Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆30Updated 2 years ago
- An OSINT employee/username enumeration tool☆61Updated 3 weeks ago
- sturdy-chainsaw☆53Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆134Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆166Updated 3 years ago
- Simple script that checks a domain for email protections☆33Updated 4 years ago
- Basic C2 Server☆187Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Ready to go Phishing Platform☆37Updated 3 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆163Updated 7 months ago
- Protocol agnostic online password guessing API.☆80Updated last year