ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+2512.5%)
Mutual labels: post-exploitation
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+2031.25%)
Mutual labels: post-exploitation
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (+62.5%)
Mutual labels: post-exploitation
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-18.75%)
Mutual labels: post-exploitation
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+693.75%)
Mutual labels: post-exploitation
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (+131.25%)
Mutual labels: post-exploitation
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (+2431.25%)
Mutual labels: post-exploitation
mOrcmOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (+0%)
Mutual labels: post-exploitation
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (+81.25%)
Mutual labels: post-exploitation
presentationsMy Presentations in PDF
Stars: ✭ 27 (+68.75%)
Mutual labels: post-exploitation
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+3656.25%)
Mutual labels: post-exploitation
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (+62.5%)
Mutual labels: post-exploitation
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (+43.75%)
Mutual labels: post-exploitation
AIX-for-Penetration-TestersA basic AIX enumeration guide for penetration testers/red teamers
Stars: ✭ 31 (+93.75%)
Mutual labels: post-exploitation
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (+600%)
Mutual labels: post-exploitation
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (+81.25%)
Mutual labels: post-exploitation
venusA Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (+193.75%)
Mutual labels: post-exploitation
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (+787.5%)
Mutual labels: post-exploitation
dfexDNS File EXfiltration
Stars: ✭ 46 (+187.5%)
Mutual labels: post-exploitation
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (+281.25%)
Mutual labels: post-exploitation