Malleable-C2-ProfilesMalleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
Stars: ✭ 168 (+194.74%)
InMemoryNETExploring in-memory execution of .NET
Stars: ✭ 55 (-3.51%)
passwordstate-decryptorPowerShell script that decrypts password entries from a Passwordstate server.
Stars: ✭ 19 (-66.67%)
AutoWinAutowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
Stars: ✭ 18 (-68.42%)
Phant0mWindows Event Log Killer
Stars: ✭ 1,423 (+2396.49%)
linklink is a command and control framework written in rust
Stars: ✭ 345 (+505.26%)
atermIt records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-70.18%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-35.09%)
nanodumpThe swiss army knife of LSASS dumping
Stars: ✭ 1,121 (+1866.67%)
Invoke-BofLoad any Beacon Object File using Powershell!
Stars: ✭ 221 (+287.72%)
LiquidSnakeLiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript
Stars: ✭ 266 (+366.67%)
LAZYPARIAHA tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+112.28%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-36.84%)
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-45.61%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+580.7%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+5.26%)
inceptorTemplate-Driven AV/EDR Evasion Framework
Stars: ✭ 730 (+1180.7%)
hackarsenaltoolkitHacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-31.58%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-49.12%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (+49.12%)
Penetration testing poc渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Stars: ✭ 3,858 (+6668.42%)
chkdfrontCheck Domain Fronting (chkdfront) - It checks if your domain fronting is working
Stars: ✭ 42 (-26.32%)
RubyfuRubyfu, where Ruby goes evil!
Stars: ✭ 228 (+300%)
DartDART is a test documentation tool created by the Lockheed Martin Red Team to document and report on penetration tests, especially in isolated network environments.
Stars: ✭ 207 (+263.16%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+121.05%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+922.81%)
Kali-TXCustomized Kali Linux - Ansible playbook
Stars: ✭ 54 (-5.26%)
RT-CyberShieldProtecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges
Stars: ✭ 34 (-40.35%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-75.44%)
WMEyeWMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement
Stars: ✭ 315 (+452.63%)
SharpUnhookerC# Based Universal API Unhooker
Stars: ✭ 255 (+347.37%)
CovenantCovenant is a collaborative .NET C2 framework for red teamers.
Stars: ✭ 2,747 (+4719.3%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+1143.86%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-68.42%)
AlanFrameworkA C2 post-exploitation framework
Stars: ✭ 405 (+610.53%)
InlineWhispers2Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2
Stars: ✭ 156 (+173.68%)
JALSIJALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-49.12%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+87.72%)
OctopusOctopus - Network Scan/Infos & Web Scan
Stars: ✭ 25 (-56.14%)
Satelliteeasy-to-use payload hosting
Stars: ✭ 193 (+238.6%)
Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
Stars: ✭ 244 (+328.07%)
ycsmThis is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).
Stars: ✭ 73 (+28.07%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+5384.21%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+122.81%)
DiscoverCustom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+4370.18%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-33.33%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+22.81%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+50.88%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-15.79%)
ja3transportImpersonating JA3 signatures
Stars: ✭ 200 (+250.88%)