All Projects → redcode-labs → Bashark

redcode-labs / Bashark

Licence: mit
Bash post exploitation toolkit

Programming Languages

shell
77523 projects
bash
514 projects

Projects that are alternatives of or similar to Bashark

gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-85.38%)
Mutual labels:  post-exploitation
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-31.06%)
Mutual labels:  post-exploitation
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+901.66%)
Mutual labels:  post-exploitation
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-50.83%)
Mutual labels:  post-exploitation
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-41.2%)
Mutual labels:  post-exploitation
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (-29.57%)
Mutual labels:  post-exploitation
redpill
Assist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-76.41%)
Mutual labels:  post-exploitation
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (-9.63%)
Mutual labels:  post-exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-33.06%)
Mutual labels:  post-exploitation
Go Shellcode
Load shellcode into a new process
Stars: ✭ 456 (-24.25%)
Mutual labels:  post-exploitation
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+485.05%)
Mutual labels:  post-exploitation
Orc
Orc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (-42.03%)
Mutual labels:  post-exploitation
Powerhub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (-28.41%)
Mutual labels:  post-exploitation
Mimipenguin
A tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+423.42%)
Mutual labels:  post-exploitation
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-20.6%)
Mutual labels:  post-exploitation
soapy
log file scrubber
Stars: ✭ 16 (-97.34%)
Mutual labels:  post-exploitation
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (-30.4%)
Mutual labels:  post-exploitation
Pyexfil
A Python Package for Data Exfiltration
Stars: ✭ 554 (-7.97%)
Mutual labels:  post-exploitation
Viper
metasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (-19.1%)
Mutual labels:  post-exploitation
Mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (-28.07%)
Mutual labels:  post-exploitation

Bashark 2.0


Bashark

Post exploitation toolkit

Language License Version

Bashark aids pentesters and security researchers during the post-exploitation phase of security audit.

Usage

To launch this tool on compromised host, simply source the bashark.sh script from terminal:

$ source bashark.sh

Then type help to see the help menu

License

This software is under MIT License

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].