muraenateam / necrobrowserLinks
necromantic session control
☆163Updated 7 months ago
Alternatives and similar repositories for necrobrowser
Users that are interested in necrobrowser are comparing it to the libraries listed below
Sorting:
- Phishlets for Evilginx2 (MITM proxy Framework)☆156Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- Hiding GoPhish from the boys in blue☆188Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆112Updated 4 years ago
- Simple script that checks a domain for email protections☆33Updated 4 years ago
- An OSINT employee/username enumeration tool☆65Updated 5 months ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆988Updated 7 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆136Updated 2 months ago
- DeepSea Phishing Gear☆120Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- ☆297Updated 2 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆437Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- Protocol agnostic online password guessing API.☆82Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆101Updated 3 years ago
- ☆199Updated 5 years ago
- Basic C2 Server☆191Updated 3 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆50Updated last year
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆173Updated 4 years ago
- sturdy-chainsaw☆63Updated last year
- ☆150Updated last year
- Chameleon: A tool for evading Proxy categorisation☆496Updated 6 months ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆171Updated 3 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago