MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+708.33%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+2375%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+68460.42%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (+43.75%)
DllspyDLL Hijacking Detection Tool
Stars: ✭ 202 (+320.83%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+797.92%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+83.33%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+695.83%)
WinpwnAutomation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+2614.58%)
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+1033.33%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (+772.92%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (+22.92%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+1410.42%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+195.83%)
FA2spC&C Red Alert 2: Yuri's Revenge Map Editor : Final Alert 2 extension
Stars: ✭ 28 (-41.67%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+227.08%)
Pentest-Service-EnumerationSuggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (+66.67%)
nTimetoolsTimestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
Stars: ✭ 25 (-47.92%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+64.58%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-2.08%)
Xamarin-iOSPSPDFKit for iOS wrapper for the Xamarin platform.
Stars: ✭ 14 (-70.83%)
DLL-INJECTORI created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-70.83%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-27.08%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-35.42%)
InflameUser-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.
Stars: ✭ 63 (+31.25%)
wpeARCHIVED: Use 'peh' instead
Stars: ✭ 17 (-64.58%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+535.42%)
MSBackdoor[Discontinued] Transform your payload into fake powerpoint (.ppt)
Stars: ✭ 35 (-27.08%)
RunDLL-NGA better alternative to RunDLL32
Stars: ✭ 23 (-52.08%)
ScareCrow-CobaltStrikeCobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)
Stars: ✭ 387 (+706.25%)
blazor-lazy-loadingAutomatic Lazy Loading support for Blazor (Server and WebAssembly)
Stars: ✭ 89 (+85.42%)
Standard-ToolkitAn update to Component factory's krypton toolkit to support .NET Framework 4.6.2 - 4.8.1 to .NET Core/.NET
Stars: ✭ 194 (+304.17%)
dll-diagnosticsTools for diagnosing DLL dependency loading issues
Stars: ✭ 24 (-50%)
PEDetourmodify binary Portable Executable to hook its export functions
Stars: ✭ 59 (+22.92%)
BackdoorA backdoor that runs on Linux and Windows
Stars: ✭ 36 (-25%)
SLibSLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (+4.17%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+7639.58%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (+52.08%)
dlibDynamic loading library for C/C++
Stars: ✭ 19 (-60.42%)
xamarin-buglyA bugly SDK for Xamarin Android Bindings
Stars: ✭ 22 (-54.17%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-50%)
BackHAckBackdoor Generator | Linux & Windows | FUD AV .py .exe
Stars: ✭ 61 (+27.08%)
RSB-FrameworkWindows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-8.33%)
UniversalUnityHooksA framework designed to hook into and modify methods in unity games via dlls
Stars: ✭ 78 (+62.5%)
VoiceBridgeVoiceBridge - an AI-TOOLKIT Open Source C++ Speech Recognition Toolkit
Stars: ✭ 17 (-64.58%)
disctopia-c2Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+350%)
example-appExample app showcasing fulls1z3's Angular libraries
Stars: ✭ 27 (-43.75%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-70.83%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+770.83%)
PhobosAres-compatible C&C Red Alert 2: Yuri's Revenge engine extension
Stars: ✭ 123 (+156.25%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+529.17%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-4.17%)