redcode-labs / Bashark
Licence: mit
Bash post exploitation toolkit
Stars: ✭ 602
Labels
Projects that are alternatives of or similar to Bashark
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-85.38%)
Mutual labels: post-exploitation
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-31.06%)
Mutual labels: post-exploitation
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+901.66%)
Mutual labels: post-exploitation
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-50.83%)
Mutual labels: post-exploitation
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-41.2%)
Mutual labels: post-exploitation
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (-29.57%)
Mutual labels: post-exploitation
redpill
Assist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-76.41%)
Mutual labels: post-exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-33.06%)
Mutual labels: post-exploitation
Go Shellcode
Load shellcode into a new process
Stars: ✭ 456 (-24.25%)
Mutual labels: post-exploitation
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+485.05%)
Mutual labels: post-exploitation
Orc
Orc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (-42.03%)
Mutual labels: post-exploitation
Powerhub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (-28.41%)
Mutual labels: post-exploitation
Mimipenguin
A tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+423.42%)
Mutual labels: post-exploitation
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-20.6%)
Mutual labels: post-exploitation
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (-30.4%)
Mutual labels: post-exploitation
Mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (-28.07%)
Mutual labels: post-exploitation
Bashark 2.0
Post exploitation toolkit
Bashark aids pentesters and security researchers during the post-exploitation phase of security audit.
Usage
To launch this tool on compromised host, simply source the bashark.sh
script from terminal:
$ source bashark.sh
Then type help
to see the help menu
License
This software is under MIT License
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].