ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+425.93%)
Mutual labels: post-exploitation, metasploit
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+1670.37%)
Mutual labels: post-exploitation, metasploit
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+614.81%)
Mutual labels: post-exploitation, metasploit
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+3248.15%)
Mutual labels: post-exploitation, metasploit
Msf AuxiliarysMy collection of metasploit auxiliary post-modules
Stars: ✭ 183 (+577.78%)
Mutual labels: post-exploitation, metasploit
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+588.89%)
Mutual labels: post-exploitation, metasploit
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+2125.93%)
Mutual labels: post-exploitation, metasploit
htrgouvea.github.ioMy past public researches are archived here
Stars: ✭ 18 (-33.33%)
Mutual labels: research
UAV-Stereo-VisionA program for controlling a micro-UAV for obstacle detection and collision avoidance using disparity mapping
Stars: ✭ 30 (+11.11%)
Mutual labels: research
crySageMath/Python Toolkit for Cryptanalytic Research
Stars: ✭ 23 (-14.81%)
Mutual labels: research
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+1162.96%)
Mutual labels: post-exploitation
trackswitch.jsA Versatile Web-Based Audio Player for Presenting Scientific Results
Stars: ✭ 39 (+44.44%)
Mutual labels: research
LudiiExampleAIProject with examples for the implementation of third-party AI algorithms / agents for the Ludii general game system.
Stars: ✭ 20 (-25.93%)
Mutual labels: research
sjmSancho McCann's PhD Thesis Research Code
Stars: ✭ 24 (-11.11%)
Mutual labels: research
GitHubDropBoxA tutorial for how to combine GitHub and DropBox in a research project
Stars: ✭ 28 (+3.7%)
Mutual labels: research
venusA Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+74.07%)
Mutual labels: post-exploitation
p2psecresearch on privacy and security in p2p and decentralised systems
Stars: ✭ 38 (+40.74%)
Mutual labels: research
euro-calliopeA workflow to build models of the European electricity system for Calliope.
Stars: ✭ 23 (-14.81%)
Mutual labels: research
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-14.81%)
Mutual labels: post-exploitation
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (+37.04%)
Mutual labels: post-exploitation