All Projects → gtfo → Similar Projects or Alternatives

716 Open source projects that are alternatives of or similar to gtfo

bin2c
Convert binary files to C arrays for easy inclusion with your code.
Stars: ✭ 21 (-76.14%)
Mutual labels:  binary
fofa viewer
一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+826.14%)
Mutual labels:  redteam
bank mitigations
Anti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-80.68%)
Mutual labels:  blueteam
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+30.68%)
Mutual labels:  blueteam
CycleTLS
Spoof TLS/JA3 fingerprints in GO and Javascript
Stars: ✭ 362 (+311.36%)
Mutual labels:  bypass
Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+1361.36%)
Mutual labels:  reverse-shell
Clippy
Terribad PrivEsc enumeration script for Windows systems
Stars: ✭ 15 (-82.95%)
Mutual labels:  privilege-escalation
instrumentation
Assorted pintools
Stars: ✭ 24 (-72.73%)
Mutual labels:  binary
basgo
basgo compiles BASIC-lang to Golang. Then 'go build' can translate code to native executable binary.
Stars: ✭ 31 (-64.77%)
Mutual labels:  binary
SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-73.86%)
Mutual labels:  post-exploitation
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-72.73%)
Mutual labels:  privilege-escalation
Fwdsh3ll
Forward shell generation framework
Stars: ✭ 62 (-29.55%)
Mutual labels:  reverse-shell
Hacking With Golang
Golang安全资源合集
Stars: ✭ 876 (+895.45%)
Mutual labels:  reverse-shell
Binary-Learning
二进制安全相关的学习笔记,感谢滴水逆向的所有老师辛苦教学。
Stars: ✭ 886 (+906.82%)
Mutual labels:  binary
Pythonadvancedhttpreverseshell
Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
Stars: ✭ 22 (-75%)
Mutual labels:  reverse-shell
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-47.73%)
Mutual labels:  oscp
EzpzShell
Collection Of Reverse Shell that can easily generate using Python3
Stars: ✭ 46 (-47.73%)
Mutual labels:  reverse-shell
Wpforce
Wordpress Attack Suite
Stars: ✭ 633 (+619.32%)
Mutual labels:  reverse-shell
mOrc
mOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-81.82%)
Mutual labels:  post-exploitation
expdev
Vulnerable software and exploits used for OSCP/OSCE preparation
Stars: ✭ 24 (-72.73%)
Mutual labels:  oscp
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-57.95%)
Mutual labels:  post-exploitation
machinescli
This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.
Stars: ✭ 34 (-61.36%)
Mutual labels:  oscp
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+426.14%)
Mutual labels:  reverse-shell
BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
Stars: ✭ 24 (-72.73%)
Mutual labels:  blueteam
Privilege Escalation
UAC Bypass for windows
Stars: ✭ 33 (-62.5%)
Mutual labels:  privilege-escalation
binary.com-bot
Scripts for using on Binary.com Bots.
Stars: ✭ 60 (-31.82%)
Mutual labels:  binary
cargo-binstall
Binary installation for rust projects
Stars: ✭ 421 (+378.41%)
Mutual labels:  binary
HackingAllTheThings
My documentation and tools for learn ethical hacking.
Stars: ✭ 66 (-25%)
Mutual labels:  oscp
exploits
Exploits developed by me.
Stars: ✭ 35 (-60.23%)
Mutual labels:  oscp
AIX-for-Penetration-Testers
A basic AIX enumeration guide for penetration testers/red teamers
Stars: ✭ 31 (-64.77%)
Mutual labels:  post-exploitation
Revssl
A script that automates generation of OpenSSL reverse shells
Stars: ✭ 284 (+222.73%)
Mutual labels:  reverse-shell
bin-version-cli
Get the version of a binary in semver format
Stars: ✭ 36 (-59.09%)
Mutual labels:  binary
xbedump
Tool to dump header information or sign original Xbox executables
Stars: ✭ 18 (-79.55%)
Mutual labels:  binary
Android Upload Service
Easily upload files (Multipart/Binary/FTP out of the box) in the background with progress notification. Support for persistent upload requests, customizations and custom plugins.
Stars: ✭ 2,593 (+2846.59%)
Mutual labels:  binary
HatVenom
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-4.55%)
Mutual labels:  binary
Binary Human Pose Estimation
This code implements a demo of the Binarized Convolutional Landmark Localizers for Human Pose Estimation and Face Alignment with Limited Resources paper by Adrian Bulat and Georgios Tzimiropoulos.
Stars: ✭ 210 (+138.64%)
Mutual labels:  binary
rpc2socks
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (+43.18%)
Mutual labels:  post-exploitation
Binaryserializer
A declarative serialization framework for controlling formatting of data at the byte and bit level using field bindings, converters, and code.
Stars: ✭ 197 (+123.86%)
Mutual labels:  binary
requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (+267.05%)
Mutual labels:  bypass
Qiling
Qiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+3100%)
Mutual labels:  binary
k0otkit
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+146.59%)
Mutual labels:  reverse-shell
Raw Wasm
Raw WebAssembly demos
Stars: ✭ 183 (+107.95%)
Mutual labels:  binary
CFX-BYPASS
Bypass it, you won't be Banned when playing cheats 2022
Stars: ✭ 18 (-79.55%)
Mutual labels:  bypass
Karkinos
A thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (+93.18%)
Mutual labels:  binary
ETWNetMonv3
ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (-63.64%)
Mutual labels:  blueteam
Cs2cpp
C# to C++ transpiler (Cs2Cpp) (Powered by Roslyn)
Stars: ✭ 155 (+76.14%)
Mutual labels:  binary
lightify-binary-protocol
Documentation of the OSRAM Lightify Binary Protocol for communication between Lightify Gateway and applications
Stars: ✭ 26 (-70.45%)
Mutual labels:  binary
ImpulsiveDLLHijack
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+193.18%)
Mutual labels:  redteam
bypass-paywalls-chrome-clean-magnolia1234
Bypass Paywalls Chrome Clean (GitLab proxy)
Stars: ✭ 32 (-63.64%)
Mutual labels:  bypass
xgadget
Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-62.5%)
Mutual labels:  binary
Linux-Kernel-Exploitation
Linux kernel development & exploitation lab.
Stars: ✭ 130 (+47.73%)
Mutual labels:  privilege-escalation
vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (-46.59%)
Mutual labels:  binary
Binpp
🔢 Erlang Binary Pretty Printer
Stars: ✭ 148 (+68.18%)
Mutual labels:  binary
tor-rootkit
A Python 3 standalone Windows 10 / Linux Rootkit using Tor.
Stars: ✭ 142 (+61.36%)
Mutual labels:  reverse-shell
Exodus
Painless relocation of Linux binaries–and all of their dependencies–without containers.
Stars: ✭ 2,560 (+2809.09%)
Mutual labels:  binary
Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-62.5%)
Mutual labels:  blueteam
binaryapi
Binary.com & Deriv.com API for Python
Stars: ✭ 32 (-63.64%)
Mutual labels:  binary
palinka c2
Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-84.09%)
Mutual labels:  redteam
pentesting-dockerfiles
Pentesting/Bugbounty Dockerfiles.
Stars: ✭ 148 (+68.18%)
Mutual labels:  redteam
OSCE
Some exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (-15.91%)
Mutual labels:  bypass
301-360 of 716 similar projects