All Projects → Ghost → Similar Projects or Alternatives

1248 Open source projects that are alternatives of or similar to Ghost

Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+94.96%)
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-81.25%)
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-85.69%)
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-91.23%)
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+499.19%)
Mutual labels:  kali-linux, hacking, backdoor, rat
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-35.89%)
Mutual labels:  hacking, backdoor, rat
Slickermaster Rev4
NSA Hacking Tool Recreation UnitedRake
Stars: ✭ 62 (-93.75%)
Mutual labels:  hacking, exploit, rat
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-96.47%)
Mutual labels:  backdoor, exploit, rat
Phonesploit
Using open Adb ports we can exploit a Andriod Device
Stars: ✭ 854 (-13.91%)
Mutual labels:  hacking, exploit, adb
Pentest Tools Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-95.16%)
Beef Over Wan
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-91.73%)
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+19.76%)
Mutual labels:  hacking, backdoor, post-exploitation
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-87.3%)
Mutual labels:  kali-linux, hacking, exploit
Androrat
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (-81.15%)
Mutual labels:  exploit, backdoor, rat
Adbsploit
A python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-85.18%)
Mutual labels:  hacking, exploit, adb
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-60.18%)
Mutual labels:  hacking, backdoor, rat
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-68.55%)
Mutual labels:  hacking, backdoor, rat
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-86.39%)
Mutual labels:  hacking, backdoor, rat
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+579.13%)
Mutual labels:  backdoor, rat, post-exploitation
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+14.11%)
Mutual labels:  kali-linux, hacking, backdoor
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+84.07%)
Mutual labels:  backdoor, rat, post-exploitation
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-74.7%)
Mutual labels:  hacking, backdoor, post-exploitation
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (-70.16%)
Mutual labels:  backdoor, rat, kali-linux
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-60.99%)
Mutual labels:  hacking, backdoor, rat
Jenkins Rce
😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-73.59%)
Mutual labels:  hacking, exploit
Hacking Security Ebooks
Top 100 Hacking & Security E-Books (Free Download)
Stars: ✭ 3,232 (+225.81%)
Mutual labels:  kali-linux, hacking
Free Security Ebooks
Free Security and Hacking eBooks
Stars: ✭ 3,132 (+215.73%)
Mutual labels:  kali-linux, hacking
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-73.49%)
Mutual labels:  exploit, backdoor
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-72.68%)
Mutual labels:  hacking, rat
pwnscripts
Very simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-93.35%)
Mutual labels:  exploit, exploitation-framework
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+253.13%)
Mutual labels:  kali-linux, hacking
Featherduster
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (-11.69%)
Mutual labels:  exploit, exploitation-framework
Shell Backdoor List
🎯 PHP / ASP - Shell Backdoor List 🎯
Stars: ✭ 288 (-70.97%)
Mutual labels:  hacking, backdoor
Android Exploits
A collection of android Exploits and Hacks
Stars: ✭ 290 (-70.77%)
Mutual labels:  hacking, exploit
AdbNet
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-88.71%)
Mutual labels:  adb, post-exploitation
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (-72.58%)
Mutual labels:  kali-linux, hacking
Tomcatwardeployer
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
Stars: ✭ 287 (-71.07%)
Mutual labels:  hacking, backdoor
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-96.98%)
Mutual labels:  hacking, post-exploitation
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (-69.25%)
Mutual labels:  kali-linux, hacking
Shuffle
WebShell Backdoor Framework
Stars: ✭ 11 (-98.89%)
Mutual labels:  hacking, backdoor
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (-69.76%)
Mutual labels:  kali-linux, hacking
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (-66.83%)
Mutual labels:  hacking, post-exploitation
Androrat
AndroRAT | Remote Administrator Tool for Android OS Hacking
Stars: ✭ 340 (-65.73%)
Mutual labels:  exploit, rat
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (-14.62%)
Mutual labels:  hacking, exploit
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (-64.42%)
Mutual labels:  kali-linux, hacking
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (-64.31%)
Mutual labels:  hacking, post-exploitation
Pwn jenkins
Notes about attacking Jenkins servers
Stars: ✭ 841 (-15.22%)
Mutual labels:  hacking, exploit
paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (-41.23%)
Mutual labels:  backdoor, rat
Windows Post Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-70.16%)
Mutual labels:  hacking, post-exploitation
Cve 2019 0708
3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-64.72%)
Mutual labels:  hacking, exploit
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+320.67%)
Mutual labels:  hacking, exploit
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-61.49%)
Mutual labels:  hacking, exploit
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (-57.76%)
Mutual labels:  rat, post-exploitation
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-58.17%)
Mutual labels:  rat, post-exploitation
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-57.46%)
Mutual labels:  kali-linux, hacking
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-51.81%)
Mutual labels:  backdoor, post-exploitation
Cloak
Cloak can backdoor any python script with some tricks.
Stars: ✭ 411 (-58.57%)
Mutual labels:  exploit, backdoor
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-52.22%)
Mutual labels:  hacking, exploit
Hack Tools
hack tools
Stars: ✭ 488 (-50.81%)
Mutual labels:  hacking, exploit
Njrat 0.7d Stub Csharp
njRAT C# Stub - Fixed For PowerShell
Stars: ✭ 28 (-97.18%)
Mutual labels:  backdoor, rat
1-60 of 1248 similar projects