1 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
EvilNeko automates container orchestration to facilitate Browser in the Browser (BITB) attacks for red teams. It helps emulate these techniques and assists blue teams in detecting them. Users need to supply their own payloads and set up the required environment on Linux or MacOS.
If you do, here's more
EvilNeko is designed to automate container orchestration and operationalize Browser in the Browser (BITB) attacks, primarily for red teams. The project builds on concepts introduced by Mr. d0x and the EvilNoVNC project. Unlike existing tools that focus on single-user sessions, EvilNeko allows for scaling infrastructure across multiple targets, providing red teams with a more effective way to simulate BITB techniques. This capability also helps blue teams detect such attacks.
The tool leverages the neko project to create browser containers that interact over WebRTC. Users need to supply their own payloads, particularly in the form of unpacked Chrome extensions, which must be placed in the specified directory. EvilNeko operates on Linux and MacOS, requiring installations of Docker, Docker Compose, Flask, and NGINX to function properly.
Setting up EvilNeko involves cloning the repository and running the main script. Users must define their domain and the URL for the neko container, then they can create multiple instances to target. Traffic routing is managed through NGINX, ensuring that each container receives the correct traffic. Containers can be destroyed individually or all at once, and exiting the program will also clean up any running containers. This setup provides a streamlined process for conducting authorized testing on environments where consent has been obtained.
Questions about this article
No questions yet.