☆143Jun 26, 2019Updated 6 years ago
Alternatives and similar repositories for necrobrowser-old-go
Users that are interested in necrobrowser-old-go are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,052Feb 18, 2026Updated last month
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 6 months ago
- The SSH Multiplex Backdoor Tool☆64Oct 21, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Jul 26, 2018Updated 7 years ago
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- necromantic session control☆182Feb 17, 2026Updated last month
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Mar 31, 2026Updated last week
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- A simple embedded Linux backdoor.☆200Oct 25, 2020Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆605Mar 2, 2021Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ☆527Sep 15, 2022Updated 3 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆25Jul 5, 2018Updated 7 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆398Apr 22, 2018Updated 7 years ago
- easy-to-use payload hosting☆275Apr 22, 2022Updated 3 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆174Jul 22, 2020Updated 5 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,384May 22, 2020Updated 5 years ago
- File/Web Text Scraper and Wordlist Generator☆40Oct 1, 2020Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆207May 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Extract stored credentials from Internet Explorer and Edge☆326Sep 15, 2020Updated 5 years ago
- ☆526Aug 11, 2023Updated 2 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆151Jun 5, 2025Updated 10 months ago
- Universal Unhooking☆326Sep 19, 2018Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,561Oct 17, 2022Updated 3 years ago
- ☆58Jun 28, 2020Updated 5 years ago