All Projects → AlanFramework → Similar Projects or Alternatives

438 Open source projects that are alternatives of or similar to AlanFramework

hackarsenaltoolkit
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-90.37%)
Mutual labels:  hacking-tool, red-team, red-teaming
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-96.54%)
Mutual labels:  red-team, c2, red-teaming
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-90.86%)
Mutual labels:  post-exploitation, red-team, c2
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-64.94%)
Mutual labels:  post-exploitation, hacking-tool
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+2.96%)
Mutual labels:  post-exploitation, hacking-tool
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-70.12%)
Mutual labels:  red-team, red-teaming
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+180.49%)
Mutual labels:  hacking-tool, red-team
SpyGen
Trojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-71.6%)
Mutual labels:  hacking-tool, security-tool
paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+43.95%)
Mutual labels:  hacking-tool, red-team
JALSI
JALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-92.84%)
Mutual labels:  red-team, red-teaming
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+579.01%)
Mutual labels:  red-team, red-teaming
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-54.07%)
Mutual labels:  post-exploitation, hacking-tool
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-91.6%)
Mutual labels:  red-team, red-teaming
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+91.36%)
Mutual labels:  hacking-tool, red-team
XENA
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-68.64%)
Mutual labels:  post-exploitation, red-team
InlineWhispers2
Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (-61.48%)
Mutual labels:  red-team, red-teaming
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (-82.72%)
Mutual labels:  red-team, red-teaming
inceptor
Template-Driven AV/EDR Evasion Framework
Stars: ✭ 730 (+80.25%)
Mutual labels:  red-team, red-teaming
AdbNet
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-72.35%)
Mutual labels:  post-exploitation, hacking-tool
link
link is a command and control framework written in rust
Stars: ✭ 345 (-14.81%)
Mutual labels:  red-team, c2
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-91.11%)
Mutual labels:  red-team, red-teaming
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-2.47%)
Mutual labels:  hacking-tool, red-team
Covenant
Covenant is a collaborative .NET C2 framework for red teamers.
Stars: ✭ 2,747 (+578.27%)
Mutual labels:  red-team, c2
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+769.63%)
Mutual labels:  post-exploitation, c2
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-26.91%)
Mutual labels:  post-exploitation, hacking-tool
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+1814.07%)
Mutual labels:  post-exploitation, hacking-tool
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+34.32%)
Mutual labels:  post-exploitation, red-team
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-88.4%)
Mutual labels:  post-exploitation, c2
MacOS-WPA-PSK
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-92.84%)
Mutual labels:  post-exploitation, red-team
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+3.46%)
Mutual labels:  post-exploitation, hacking-tool
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-52.35%)
Mutual labels:  post-exploitation, red-team
EMAGNET
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 1,427 (+252.35%)
Mutual labels:  hacking-tool
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-52.84%)
Mutual labels:  post-exploitation
Lo0sR
Lo0sR is a simple python Keylogger with many functions.
Stars: ✭ 48 (-88.15%)
Mutual labels:  hacking-tool
Poet
[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-54.57%)
Mutual labels:  post-exploitation
Msf Auxiliarys
My collection of metasploit auxiliary post-modules
Stars: ✭ 183 (-54.81%)
Mutual labels:  post-exploitation
Zombieant
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-58.27%)
Mutual labels:  post-exploitation
redteamwiki
redteam.wiki
Stars: ✭ 75 (-81.48%)
Mutual labels:  hacking-tool
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-58.77%)
Mutual labels:  post-exploitation
Botnet
Remote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.
Stars: ✭ 26 (-93.58%)
Mutual labels:  hacking-tool
Credit-Card-Bruteforcer
Hacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
Stars: ✭ 50 (-87.65%)
Mutual labels:  post-exploitation
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-59.01%)
Mutual labels:  post-exploitation
Herakeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-65.93%)
Mutual labels:  post-exploitation
slopShell
the only php webshell you need.
Stars: ✭ 208 (-48.64%)
Mutual labels:  hacking-tool
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+350.86%)
Mutual labels:  post-exploitation
Evasor
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-66.91%)
Mutual labels:  post-exploitation
Web-Tracker
Stand alone program that Tracks/Logs all the opened websites in the Chrome Browser. Even incognito! *No need to install anything in browser*
Stars: ✭ 34 (-91.6%)
Mutual labels:  hacking-tool
uberducky
Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)
Stars: ✭ 80 (-80.25%)
Mutual labels:  hacking-tool
Silenttrinity
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+336.3%)
Mutual labels:  post-exploitation
Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-72.35%)
Mutual labels:  post-exploitation
Storm-Breaker
Social engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+267.65%)
Mutual labels:  hacking-tool
Postexploits
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-72.59%)
Mutual labels:  post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+377.53%)
Mutual labels:  post-exploitation
rockstar-cli
Become a Github Rockstar in less than 10 seconds
Stars: ✭ 18 (-95.56%)
Mutual labels:  hacking-tool
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-73.33%)
Mutual labels:  post-exploitation
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-88.4%)
Mutual labels:  hacking-tool
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-73.58%)
Mutual labels:  post-exploitation
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-78.52%)
Mutual labels:  post-exploitation
Aliens eye
Social media hunter
Stars: ✭ 105 (-74.07%)
Mutual labels:  hacking-tool
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-78.52%)
Mutual labels:  post-exploitation
1-60 of 438 similar projects