muraenateam / necrobrowserLinks
necromantic session control
☆162Updated 6 months ago
Alternatives and similar repositories for necrobrowser
Users that are interested in necrobrowser are comparing it to the libraries listed below
Sorting:
- Phishlets for Evilginx2 (MITM proxy Framework)☆154Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆101Updated 3 years ago
- Method to bypass Google's JS security when using MITM phishing tools☆62Updated last year
- Simple script that checks a domain for email protections☆33Updated 4 years ago
- ☆150Updated last year
- Hiding GoPhish from the boys in blue☆183Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆111Updated 4 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆132Updated last month
- ☆139Updated last year
- ☆30Updated 2 years ago
- Password Breach API Server☆87Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆118Updated last year
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- ☆198Updated 5 years ago
- ☆190Updated 2 years ago
- sturdy-chainsaw☆57Updated last year
- Protocol agnostic online password guessing API.☆80Updated 2 years ago
- Evil client portion of EAP relay attack☆202Updated last year
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 6 months ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆130Updated 2 years ago
- DeepSea Phishing Gear☆120Updated 4 years ago
- Extract credentials and other useful info from network captures☆69Updated 2 years ago
- ☆109Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆980Updated 6 months ago
- Resolves an IP address to the cloud provider it is hosted on☆96Updated last week
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆271Updated last year
- An OSINT employee/username enumeration tool☆62Updated 5 months ago
- Scrape, Hunt, and Transform names and usernames☆119Updated 2 years ago