PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
BifrostBifrost C2. Open-source post-exploitation using Discord API
venusA Visual Studio Code Extension agent for Mythic C2
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
sudo sniffSteal user's password when running sudo for post-exploitation purposes
rpc2socksPost-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
ToRat clientThis is the ToRat client, a part of the ToRat Project.
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Teardroid-phprat🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio