gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-62.07%)
GtfonowAutomatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-70.69%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+412.07%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-38.79%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+78.88%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+446.55%)
EvilosxAn evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+687.07%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+327.59%)
ZombieantZombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-27.16%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+743.1%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+289.66%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-62.5%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-62.5%)
Kernel ExploitsMy proof-of-concept exploits for the Linux kernel
Stars: ✭ 1,173 (+405.6%)
Poet[unmaintained] Post-exploitation tool
Stars: ✭ 184 (-20.69%)
Sudo killerA tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+362.5%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+4842.24%)
OdatODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (+290.52%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-16.81%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+3241.38%)
Postexploits(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-52.16%)
ByobAn open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+2895.26%)
MsdatMSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (+167.67%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-28.02%)
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-53.88%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (+138.79%)
Juicy PotatoA sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Stars: ✭ 1,276 (+450%)
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-37.93%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-19.83%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (+134.48%)
HerakeyloggerChrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-40.52%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+109.91%)
DllspyDLL Hijacking Detection Tool
Stars: ✭ 202 (-12.93%)
Decryptrdcmanager.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-74.57%)
EvasorA tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-42.24%)
PrivesccheckPrivilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (+344.83%)
Msf AuxiliarysMy collection of metasploit auxiliary post-modules
Stars: ✭ 183 (-21.12%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-87.07%)
SilenttrinityAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+661.64%)
EnumyLinux post exploitation privilege escalation enumeration
Stars: ✭ 210 (-9.48%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+3013.79%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-51.72%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+2803.88%)
Pe LinuxLinux Privilege Escalation Tool By WazeHell
Stars: ✭ 168 (-27.59%)
OscpCollection of things made during my OSCP journey
Stars: ✭ 709 (+205.6%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-53.45%)
BasharkBash post exploitation toolkit
Stars: ✭ 602 (+159.48%)
Dns PersistDNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (-17.67%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+14084.91%)
PytmipePython library and client for token manipulations and impersonations for privilege escalation on Windows
Stars: ✭ 104 (-55.17%)
Dirty sockLinux privilege escalation exploit via snapd (CVE-2019-7304)
Stars: ✭ 533 (+129.74%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+106.03%)
Delete2systemWeaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM
Stars: ✭ 95 (-59.05%)
YodoLocal Privilege Escalation
Stars: ✭ 203 (-12.5%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-17.67%)