ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-30.56%)
EnumyLinux post exploitation privilege escalation enumeration
Stars: ✭ 210 (-65.12%)
dfexDNS File EXfiltration
Stars: ✭ 46 (-92.36%)
rpc2socksPost-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (-79.07%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-72.26%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-85.38%)
Teardroid-phprat🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (-30.73%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-31.06%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-69.1%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-89.87%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-78.9%)
EvilosxAn evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+203.32%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-50.83%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-97.84%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-29.57%)
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (-32.72%)
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-76.41%)
RspetRSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-58.31%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+901.66%)
Dns PersistDNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (-68.27%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-95.68%)
Msf AuxiliarysMy collection of metasploit auxiliary post-modules
Stars: ✭ 183 (-69.6%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-41.2%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-76.41%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-93.85%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-95.18%)
EvasorA tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-77.74%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+485.05%)
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-95.68%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (-28.41%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (-0.17%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+423.42%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-20.6%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-95.18%)
soapylog file scrubber
Stars: ✭ 16 (-97.34%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+221.26%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-30.4%)
Credit-Card-BruteforcerHacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
Stars: ✭ 50 (-91.69%)
mOrcmOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-97.34%)
LeprechaunThis tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Stars: ✭ 232 (-61.46%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (-9.63%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-67.94%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-81.4%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-68.27%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-33.06%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-69.44%)
ZombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-71.93%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (-24.25%)
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-96.18%)
HerakeyloggerChrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-77.08%)
OrcOrc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (-42.03%)
venusA Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-92.19%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (-7.97%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (-19.1%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (-28.07%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-45.35%)
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (-43.36%)