muraena
Phishing simulator
Automates interactions with targeted websites to mimic user behavior and gather data
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
927 stars
42 watching
172 forks
Language: Go
last commit: 9 days ago Related projects:
Repository | Description | Stars |
---|---|---|
xiecat/goblin | A tool for simulating phishing attacks in red teaming exercises. | 1,444 |
mandiant/reelphish | A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. | 507 |
raikia/fiercephish | A tool for managing phishing campaigns and simulating email attacks. | 1,324 |
omergunal/pot | Automated phishing attack simulation tool | 251 |
sebastian-mora/awsssome_phish | A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. | 29 |
curtbraz/phishapi | A tool for creating and deploying fake web pages to steal credentials | 372 |
gemgeorge/sniperphish | A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. | 540 |
alteredsecurity/365-stealer | A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. | 452 |
pentestgeek/phishing-frenzy | A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities | 794 |
mushorg/glastopf | A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 561 |
uber-common/metta | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,101 |
zerofox-oss/phishpond | A tool for analyzing phishing kits in a contained environment | 43 |
s4n7h0/xvwa | A training tool to help security enthusiasts learn web application security vulnerabilities and weaknesses by practicing on a deliberately flawed web application. | 1,699 |
claroty/arya | A tool that generates custom-made files to trigger YARA rules and mimic malware behavior. | 239 |
webpwnized/mutillidae | A deliberately vulnerable web application providing a controlled environment for learning and practicing web security skills. | 1,267 |