All Projects → spencerdodd → Pysploit

spencerdodd / Pysploit

Remote exploitation framework written in Python

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Pysploit

Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (+818.92%)
Mutual labels:  exploit, exploitation, remote
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+610.81%)
Mutual labels:  exploit, remote
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (+2267.57%)
Mutual labels:  exploit, exploitation
Ms17 010 Python
MS17-010: Python and Meterpreter
Stars: ✭ 305 (+724.32%)
Mutual labels:  exploitation, payload
SQL Injection Payload
SQL Injection Payload List
Stars: ✭ 62 (+67.57%)
Mutual labels:  exploit, payload
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+1370.27%)
Mutual labels:  exploit, exploitation
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (+64.86%)
Mutual labels:  exploitation, payload
Cve 2019 11708
Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (+1470.27%)
Mutual labels:  exploit, exploitation
Heap Viewer
An IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (+1451.35%)
Mutual labels:  exploit, exploitation
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+12062.16%)
Mutual labels:  exploit, exploitation
HatVenom
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+127.03%)
Mutual labels:  exploit, payload
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+2059.46%)
Mutual labels:  exploit, exploitation
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+1370.27%)
Mutual labels:  exploit, exploitation
Tegrarcmgui
C++ GUI for TegraRcmSmash (Fusée Gelée exploit for Nintendo Switch)
Stars: ✭ 965 (+2508.11%)
Mutual labels:  exploit, payload
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+1954.05%)
Mutual labels:  exploit, payload
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (-21.62%)
Mutual labels:  exploit, exploitation
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+102.7%)
Mutual labels:  exploitation, payload
WinRAT
(Windows/Linux/Mac) Remote Administration Tool
Stars: ✭ 35 (-5.41%)
Mutual labels:  remote, payload
Cloak
Cloak can backdoor any python script with some tricks.
Stars: ✭ 411 (+1010.81%)
Mutual labels:  exploit, payload
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+1559.46%)
Mutual labels:  exploit, exploitation

pysploit

This is a metasploit-like framework for system exploitation and penetration testing written in python. It is a work in progress and is an educational exercise for me so I learn how things actually work and stop being such a skid.

Example of exploitation of the shellshock vulnerability (CVE-2014-6071)

shellshocked

As easy as that!

=-=-=-= To Do =-=-=-=

  • [x] Build network module for the framework to handle shells inside pysploit

  • [ ] Create some payloads / payload execution frameworks (based off of network module interactions)

  • [ ] Automated privilege escalation framework based on system profiling/enumeration

  • [ ] Create machine profiles that log and remember successful exploit chains that lead to either user or system compromise. Should have the ability to 'one-shot' re-root a logged machine profile by executing a single function.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].