All Projects → V1V1 → AIX-for-Penetration-Testers

V1V1 / AIX-for-Penetration-Testers

Licence: MIT license
A basic AIX enumeration guide for penetration testers/red teamers

Projects that are alternatives of or similar to AIX-for-Penetration-Testers

Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+358.06%)
Mutual labels:  post-exploitation
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (+516.13%)
Mutual labels:  post-exploitation
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+1245.16%)
Mutual labels:  post-exploitation
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (+438.71%)
Mutual labels:  post-exploitation
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+500%)
Mutual labels:  post-exploitation
Enumy
Linux post exploitation privilege escalation enumeration
Stars: ✭ 210 (+577.42%)
Mutual labels:  post-exploitation
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+5790.32%)
Mutual labels:  post-exploitation
ToRat client
This is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-6.45%)
Mutual labels:  post-exploitation
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+516.13%)
Mutual labels:  post-exploitation
Credit-Card-Bruteforcer
Hacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
Stars: ✭ 50 (+61.29%)
Mutual labels:  post-exploitation
Zombieant
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (+445.16%)
Mutual labels:  post-exploitation
Poet
[unmaintained] Post-exploitation tool
Stars: ✭ 184 (+493.55%)
Mutual labels:  post-exploitation
Leprechaun
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Stars: ✭ 232 (+648.39%)
Mutual labels:  post-exploitation
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+435.48%)
Mutual labels:  post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+6138.71%)
Mutual labels:  post-exploitation
Herakeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (+345.16%)
Mutual labels:  post-exploitation
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+522.58%)
Mutual labels:  post-exploitation
ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+1248.39%)
Mutual labels:  post-exploitation
AlanFramework
A C2 post-exploitation framework
Stars: ✭ 405 (+1206.45%)
Mutual labels:  post-exploitation
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+709.68%)
Mutual labels:  post-exploitation
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].