All Projects → akayn → Postexploits

akayn / Postexploits

Licence: mit
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..

Projects that are alternatives of or similar to Postexploits

Herakeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (+24.32%)
Mutual labels:  post-exploitation, keylogger
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+275.68%)
Mutual labels:  keylogger, post-exploitation
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+273.87%)
Mutual labels:  post-exploitation, keylogger
Intersect 2.5
Post-Exploitation Framework
Stars: ✭ 59 (-46.85%)
Mutual labels:  post-exploitation
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-44.14%)
Mutual labels:  keylogger
Archivist
A ctypes powered python keylogger.
Stars: ✭ 92 (-17.12%)
Mutual labels:  keylogger
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-3.6%)
Mutual labels:  post-exploitation
Cornerstone
Linux命令转发记录
Stars: ✭ 51 (-54.05%)
Mutual labels:  keylogger
Keylogger
🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-12.61%)
Mutual labels:  keylogger
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-21.62%)
Mutual labels:  post-exploitation
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-21.62%)
Mutual labels:  post-exploitation
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-42.34%)
Mutual labels:  keylogger
Spykeyboard
keylogger which sends us the data to our gmail.
Stars: ✭ 95 (-14.41%)
Mutual labels:  keylogger
Blazerat
🔥 Control your Linux home computer with telegram bot.
Stars: ✭ 60 (-45.95%)
Mutual labels:  keylogger
Cromos
Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
Stars: ✭ 103 (-7.21%)
Mutual labels:  keylogger
Decryptrdcmanager
.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-46.85%)
Mutual labels:  post-exploitation
Rat Hodin V2.9
Remote Administration Tool for Linux
Stars: ✭ 97 (-12.61%)
Mutual labels:  keylogger
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1042.34%)
Mutual labels:  post-exploitation
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+970.27%)
Mutual labels:  post-exploitation
Keylogger
A powerful C keylogger for Windows.
Stars: ✭ 89 (-19.82%)
Mutual labels:  keylogger

Arsenal

post exploitation: dll injection, process hollowing, RunPe payload encryption, Keyloggers etc..
win 10 x64 || x86 compatible
!crypto implementation is delayed but you can find basic functionallty at my other project here: (.NET):RATS...


https://paypal.me/theakayn
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].