gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-34.33%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-54.48%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+263.43%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+145.52%)
rpc2socksPost-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (-5.97%)
ByobAn open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+5085.82%)
dfexDNS File EXfiltration
Stars: ✭ 46 (-65.67%)
OffensiveAutoItOffensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Stars: ✭ 341 (+154.48%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+223.13%)
Swap digger swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+164.18%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+211.94%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+5685.07%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+120.9%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+786.57%)
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (+5.97%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (+313.43%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-80.6%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-20.15%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-72.39%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+4400%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-5.22%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+640.3%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-90.3%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+216.42%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+200.75%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-78.36%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+5291.04%)
OrcOrc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (+160.45%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+846.27%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+2528.36%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+4927.61%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+2251.49%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-19.4%)
soapylog file scrubber
Stars: ✭ 16 (-88.06%)
BasharkBash post exploitation toolkit
Stars: ✭ 602 (+349.25%)
mOrcmOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-88.06%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-49.25%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-16.42%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+305.97%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-16.42%)
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-82.84%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+256.72%)
venusA Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-64.93%)
Decryptrdcmanager.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-55.97%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-78.36%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+240.3%)
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-80.6%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-35.07%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+348.51%)
PowerhubA post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (+221.64%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-77.61%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+212.69%)
SilenttrinityAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+1218.66%)
Postexploits(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-17.16%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-35.07%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+574.63%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+209.7%)