Cobalt ArsenalMy collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
Stars: ✭ 230 (+170.59%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-44.71%)
PezorOpen-Source PE Packer
Stars: ✭ 561 (+560%)
Crossc2generate CobaltStrike's cross-platform payload
Stars: ✭ 512 (+502.35%)
Poshc2A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Stars: ✭ 747 (+778.82%)
BackdorosbackdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL etc.
Stars: ✭ 50 (-41.18%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+33510.59%)
Awesome Cobaltstrikecobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
Stars: ✭ 1,157 (+1261.18%)
AggressorscriptsAggressor scripts for use with Cobalt Strike 3.0+
Stars: ✭ 501 (+489.41%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+887.06%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+6994.12%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+809.41%)
Macro packmacro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Stars: ✭ 1,072 (+1161.18%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+752.94%)
GirshAutomatically spawn a reverse shell fully interactive for Linux or Windows victim
Stars: ✭ 66 (-22.35%)
NishangNishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: ✭ 5,943 (+6891.76%)
Luwu红队基础设施自动化部署工具
Stars: ✭ 539 (+534.12%)
Ldap searchPython3 script to perform LDAP queries and enumerate users, groups, and computers from Windows Domains. Ldap_Search can also perform brute force/password spraying to identify valid accounts via LDAP.
Stars: ✭ 78 (-8.24%)
PwndropSelf-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Stars: ✭ 878 (+932.94%)
Beacon broadcastA Flutter plugin for turning your device into a beacon.
Stars: ✭ 66 (-22.35%)
GeaconPractice Go programming and implement CobaltStrike's Beacon in Go
Stars: ✭ 460 (+441.18%)
Android SdkBeaconstac ADVANCED SDK for Android devices
Stars: ✭ 18 (-78.82%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (+428.24%)
1earn个人维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 776 (+812.94%)
LuchSmall and easy to use Android library for BLE beacon monitoring
Stars: ✭ 55 (-35.29%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-15.29%)
ChashellChashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Stars: ✭ 742 (+772.94%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+10465.88%)
Lockdoor Framework🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+696.47%)
Nac bypassScript collection to bypass Network Access Control (NAC, 802.1x)
Stars: ✭ 79 (-7.06%)
Browserghost这是一个抓取浏览器密码的工具,后续会添加更多功能
Stars: ✭ 559 (+557.65%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+7164.71%)
GitgrabergitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe...
Stars: ✭ 1,164 (+1269.41%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+38616.47%)
CatchmeCatchME - WiFi Fun Box "Having Fun with ESP8266"
Stars: ✭ 28 (-67.06%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+472.94%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-3.53%)
SlackpirateSlack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Stars: ✭ 512 (+502.35%)
SnoopSnoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+942.35%)
Stowaway👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+488.24%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-20%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+487.06%)
Repo SupervisorScan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (+467.06%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1297.65%)
Ping BlockerStop sites from tracking the links you visit through hyperlink auditing
Stars: ✭ 23 (-72.94%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+436.47%)
IndoorgpsPosition Calculating with Trilateration via Bluetooth Beacons(Estimote)
Stars: ✭ 59 (-30.59%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (+420%)
Rootkits List DownloadThis is the list of all rootkits found so far on github and other sites.
Stars: ✭ 815 (+858.82%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (+0%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1344.71%)
UltimateapplockerbypasslistThe goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+1295.29%)