muraenateam / necrobrowser-old-goView external linksLinks
☆143Jun 26, 2019Updated 6 years ago
Alternatives and similar repositories for necrobrowser-old-go
Users that are interested in necrobrowser-old-go are comparing it to the libraries listed below
Sorting:
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,044Updated this week
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 3 months ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Jun 5, 2025Updated 8 months ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- easy-to-use payload hosting☆276Apr 22, 2022Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆207May 11, 2023Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- Silencing Sysmon via driver unload☆235Oct 13, 2022Updated 3 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆21Aug 23, 2022Updated 3 years ago
- Apache Module Backdoor (PoC)☆48May 22, 2019Updated 6 years ago
- Silver SAML forgery tool☆56Feb 26, 2024Updated last year
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 4 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆602Mar 2, 2021Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- ☆526Sep 15, 2022Updated 3 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago