soapylog file scrubber
Stars: ✭ 16 (-72.88%)
DungeonMaster.NETReimplementation of famous old Dungeon Master game.
Stars: ✭ 23 (-61.02%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (+630.51%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+5240.68%)
ExtensionsMy .NET extensions
Stars: ✭ 29 (-50.85%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+10120.34%)
dfexDNS File EXfiltration
Stars: ✭ 46 (-22.03%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (+838.98%)
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-61.02%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+583.05%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+5869.49%)
Standard-ToolkitAn update to Component factory's krypton toolkit to support .NET Framework 4.6.2 - 4.8.1 to .NET Core/.NET
Stars: ✭ 194 (+228.81%)
WpfdesignerThe WPF Designer from SharpDevelop
Stars: ✭ 479 (+711.86%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+49.15%)
ByobAn open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+11677.97%)
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (+140.68%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+672.88%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (+89.83%)
ClifxDeclarative framework for building command line interfaces
Stars: ✭ 900 (+1425.42%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+610.17%)
venusA Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-20.34%)
ServicestackThoughtfully architected, obscenely fast, thoroughly enjoyable web services for all
Stars: ✭ 4,976 (+8333.9%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+115.25%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+500%)
MonomodA C# modding swiss army knife, powered by cecil.
Stars: ✭ 322 (+445.76%)
SpiceSharpSpice# is a cross-platform electronic circuit simulator based on Berkeley Spice - the mother of commercial industry-standard circuit simulators.
Stars: ✭ 146 (+147.46%)
InstagramapisharpA complete Private Instagram API for .NET (C#, VB.NET).
Stars: ✭ 486 (+723.73%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+401.69%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+11318.64%)
OnovaUnopinionated auto-update framework for desktop applications
Stars: ✭ 280 (+374.58%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+710.17%)
analysis-netStatic analysis framework for .NET programs.
Stars: ✭ 19 (-67.8%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+1432.2%)
XnaToFnaRelink games / tools using the XNA Framework 4.0 to use FNA instead
Stars: ✭ 40 (-32.2%)
Opengl.netModern OpenGL bindings for C#.
Stars: ✭ 473 (+701.69%)
mOrcmOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-72.88%)
BasharkBash post exploitation toolkit
Stars: ✭ 602 (+920.34%)
BrotliSharpLibFull C# port of Brotli compression algorithm
Stars: ✭ 77 (+30.51%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+633.9%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-55.93%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1581.36%)
NinaA collection of Shorcuts to work faster in Revit.
Stars: ✭ 17 (-71.19%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+618.64%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (+3.39%)
RibbonwinformsAn Office Ribbon Control for .NET WinForms
Stars: ✭ 551 (+833.9%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-37.29%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+603.39%)
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+477.97%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+12144.07%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-50.85%)
Neuralnetwork.netA TensorFlow-inspired neural network library built from scratch in C# 7.3 for .NET Standard 2.0, with GPU support through cuDNN
Stars: ✭ 392 (+564.41%)
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-55.93%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+822.03%)
OrcOrc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (+491.53%)
CliwrapLibrary for running command line processes
Stars: ✭ 1,057 (+1691.53%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-49.15%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+13038.98%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+725.42%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+457.63%)