All Projects → Decryptrdcmanager → Similar Projects or Alternatives

114 Open source projects that are alternatives of or similar to Decryptrdcmanager

soapy
log file scrubber
Stars: ✭ 16 (-72.88%)
Mutual labels:  post-exploitation
DungeonMaster.NET
Reimplementation of famous old Dungeon Master game.
Stars: ✭ 23 (-61.02%)
Mutual labels:  net-framework
Powerhub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (+630.51%)
Mutual labels:  post-exploitation
Mimipenguin
A tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+5240.68%)
Mutual labels:  post-exploitation
Extensions
My .NET extensions
Stars: ✭ 29 (-50.85%)
Mutual labels:  net-framework
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+10120.34%)
Mutual labels:  post-exploitation
dfex
DNS File EXfiltration
Stars: ✭ 46 (-22.03%)
Mutual labels:  post-exploitation
Pyexfil
A Python Package for Data Exfiltration
Stars: ✭ 554 (+838.98%)
Mutual labels:  post-exploitation
SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-61.02%)
Mutual labels:  post-exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+583.05%)
Mutual labels:  post-exploitation
Merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+5869.49%)
Mutual labels:  post-exploitation
Standard-Toolkit
An update to Component factory's krypton toolkit to support .NET Framework 4.6.2 - 4.8.1 to .NET Core/.NET
Stars: ✭ 194 (+228.81%)
Mutual labels:  net-framework
Wpfdesigner
The WPF Designer from SharpDevelop
Stars: ✭ 479 (+711.86%)
Mutual labels:  net-framework
gtfo
Search for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (+49.15%)
Mutual labels:  post-exploitation
Byob
An open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+11677.97%)
Mutual labels:  post-exploitation
redpill
Assist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (+140.68%)
Mutual labels:  post-exploitation
Go Shellcode
Load shellcode into a new process
Stars: ✭ 456 (+672.88%)
Mutual labels:  post-exploitation
AdbNet
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (+89.83%)
Mutual labels:  post-exploitation
Clifx
Declarative framework for building command line interfaces
Stars: ✭ 900 (+1425.42%)
Mutual labels:  net-framework
presentations
My Presentations in PDF
Stars: ✭ 27 (-54.24%)
Mutual labels:  post-exploitation
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+610.17%)
Mutual labels:  post-exploitation
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-20.34%)
Mutual labels:  post-exploitation
Servicestack
Thoughtfully architected, obscenely fast, thoroughly enjoyable web services for all
Stars: ✭ 4,976 (+8333.9%)
Mutual labels:  net-framework
XENA
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+115.25%)
Mutual labels:  post-exploitation
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+500%)
Mutual labels:  post-exploitation
Monomod
A C# modding swiss army knife, powered by cecil.
Stars: ✭ 322 (+445.76%)
Mutual labels:  net-framework
SpiceSharp
Spice# is a cross-platform electronic circuit simulator based on Berkeley Spice - the mother of commercial industry-standard circuit simulators.
Stars: ✭ 146 (+147.46%)
Mutual labels:  net-framework
Instagramapisharp
A complete Private Instagram API for .NET (C#, VB.NET).
Stars: ✭ 486 (+723.73%)
Mutual labels:  net-framework
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+401.69%)
Mutual labels:  post-exploitation
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+11318.64%)
Mutual labels:  post-exploitation
Onova
Unopinionated auto-update framework for desktop applications
Stars: ✭ 280 (+374.58%)
Mutual labels:  net-framework
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+710.17%)
Mutual labels:  post-exploitation
analysis-net
Static analysis framework for .NET programs.
Stars: ✭ 19 (-67.8%)
Mutual labels:  net-framework
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+1432.2%)
Mutual labels:  post-exploitation
XnaToFna
Relink games / tools using the XNA Framework 4.0 to use FNA instead
Stars: ✭ 40 (-32.2%)
Mutual labels:  net-framework
Opengl.net
Modern OpenGL bindings for C#.
Stars: ✭ 473 (+701.69%)
Mutual labels:  net-framework
mOrc
mOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-72.88%)
Mutual labels:  post-exploitation
Bashark
Bash post exploitation toolkit
Stars: ✭ 602 (+920.34%)
Mutual labels:  post-exploitation
BrotliSharpLib
Full C# port of Brotli compression algorithm
Stars: ✭ 77 (+30.51%)
Mutual labels:  net-framework
Mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+633.9%)
Mutual labels:  post-exploitation
Powerexploit
Post-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-55.93%)
Mutual labels:  post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1581.36%)
Mutual labels:  post-exploitation
Nina
A collection of Shorcuts to work faster in Revit.
Stars: ✭ 17 (-71.19%)
Mutual labels:  net-framework
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (+618.64%)
Mutual labels:  post-exploitation
BackToMe
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (+3.39%)
Mutual labels:  post-exploitation
Ribbonwinforms
An Office Ribbon Control for .NET WinForms
Stars: ✭ 551 (+833.9%)
Mutual labels:  net-framework
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-37.29%)
Mutual labels:  post-exploitation
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+603.39%)
Mutual labels:  post-exploitation
OffensiveAutoIt
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+477.97%)
Mutual labels:  post-exploitation
Fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+12144.07%)
Mutual labels:  post-exploitation
MacOS-WPA-PSK
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-50.85%)
Mutual labels:  post-exploitation
Neuralnetwork.net
A TensorFlow-inspired neural network library built from scratch in C# 7.3 for .NET Standard 2.0, with GPU support through cuDNN
Stars: ✭ 392 (+564.41%)
Mutual labels:  net-framework
sudo sniff
Steal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-55.93%)
Mutual labels:  post-exploitation
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+822.03%)
Mutual labels:  post-exploitation
Orc
Orc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (+491.53%)
Mutual labels:  post-exploitation
Cliwrap
Library for running command line processes
Stars: ✭ 1,057 (+1691.53%)
Mutual labels:  net-framework
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-49.15%)
Mutual labels:  post-exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+13038.98%)
Mutual labels:  post-exploitation
Viper
metasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+725.42%)
Mutual labels:  post-exploitation
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (+457.63%)
Mutual labels:  post-exploitation
1-60 of 114 similar projects