All Projects → Morpheus → Similar Projects or Alternatives

77 Open source projects that are alternatives of or similar to Morpheus

CnC-detection
Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-97.81%)
Mutual labels:  metasploit
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-71.82%)
Mutual labels:  metasploit
Kali-Linux-Ebooks
Top 20 Kali Linux Related E-books (Free Download)
Stars: ✭ 134 (-80.44%)
Mutual labels:  metasploit
docker-metasploit
Metasploit framework with steroids
Stars: ✭ 49 (-92.85%)
Mutual labels:  metasploit
Sillyrat
A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
Stars: ✭ 152 (-77.81%)
Mutual labels:  metasploit
007-TheBond
This Script will help you to gather information about your victim or friend.
Stars: ✭ 371 (-45.84%)
Mutual labels:  metasploit
Pastejacker
Hacking systems with the automation of PasteJacking attacks.
Stars: ✭ 230 (-66.42%)
Mutual labels:  metasploit
Nxcrypt
NXcrypt - 'python backdoor' framework
Stars: ✭ 316 (-53.87%)
Mutual labels:  metasploit
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+301.46%)
Mutual labels:  metasploit
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (-82.77%)
Mutual labels:  metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (-12.26%)
Mutual labels:  metasploit
Sec Tools
Docker images for infosec tools
Stars: ✭ 135 (-80.29%)
Mutual labels:  metasploit
staekka
Stækka Metasploit - Extenting Metasploit
Stars: ✭ 51 (-92.55%)
Mutual labels:  metasploit
Drupalgeddon3
Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
Stars: ✭ 18 (-97.37%)
Mutual labels:  metasploit
Poc
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (-45.11%)
Mutual labels:  metasploit
Terminhack
👨‍💻 Impress your friends by pretending to be a real hacker
Stars: ✭ 73 (-89.34%)
Mutual labels:  metasploit
msf-opcua
Metasploit Modules for OPC UA
Stars: ✭ 22 (-96.79%)
Mutual labels:  metasploit
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+271.97%)
Mutual labels:  metasploit
Autosploit
Automated Mass Exploiter
Stars: ✭ 4,500 (+556.93%)
Mutual labels:  metasploit
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-72.85%)
Mutual labels:  metasploit
secist script
No description or website provided.
Stars: ✭ 86 (-87.45%)
Mutual labels:  metasploit
Metasploit in termux
Install Metasploit Framework 6 in Termux
Stars: ✭ 167 (-75.62%)
Mutual labels:  metasploit
Gray hat csharp code
This repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-56.06%)
Mutual labels:  metasploit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-79.27%)
Mutual labels:  metasploit
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-87.74%)
Mutual labels:  metasploit
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-93.43%)
Mutual labels:  metasploit
Amsiscanner
A C/C++ implementation of Microsoft's Antimalware Scan Interface
Stars: ✭ 134 (-80.44%)
Mutual labels:  metasploit
yarasploit
YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-95.47%)
Mutual labels:  metasploit
Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-95.47%)
Mutual labels:  metasploit
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-44.23%)
Mutual labels:  metasploit
JALSI
JALSI - Just Another Lame Shellcode Injector
Stars: ✭ 29 (-95.77%)
Mutual labels:  metasploit
Eternalblue
Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-78.1%)
Mutual labels:  metasploit
Andspoilt
Run interactive android exploits in linux.
Stars: ✭ 101 (-85.26%)
Mutual labels:  metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (-30.22%)
Mutual labels:  metasploit
scemu
x86 malware emulator
Stars: ✭ 150 (-78.1%)
Mutual labels:  metasploit
searchscan
Search Nmap and Metasploit scanning scripts.
Stars: ✭ 51 (-92.55%)
Mutual labels:  metasploit
Virtual Reality
Stealthy backdoor for Windows operating systems
Stars: ✭ 235 (-65.69%)
Mutual labels:  metasploit
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+448.91%)
Mutual labels:  metasploit
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-69.2%)
Mutual labels:  metasploit
msfvenom-zsh-completion
zsh completion for msfvenom in Metasploit
Stars: ✭ 42 (-93.87%)
Mutual labels:  metasploit
Mad Metasploit
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-70.8%)
Mutual labels:  metasploit
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (-19.56%)
Mutual labels:  metasploit
Technowhorse
TechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Stars: ✭ 189 (-72.41%)
Mutual labels:  metasploit
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-97.81%)
Mutual labels:  metasploit
Msf Auxiliarys
My collection of metasploit auxiliary post-modules
Stars: ✭ 183 (-73.28%)
Mutual labels:  metasploit
Ms17 010 Python
MS17-010: Python and Meterpreter
Stars: ✭ 305 (-55.47%)
Mutual labels:  metasploit
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-73.72%)
Mutual labels:  metasploit
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (-43.36%)
Mutual labels:  metasploit
Fido
Teaching old shellcode new tricks
Stars: ✭ 169 (-75.33%)
Mutual labels:  metasploit
Cooolis Ms
Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
Stars: ✭ 436 (-36.35%)
Mutual labels:  metasploit
Scrun
BypassAV ShellCode Loader (Cobaltstrike/Metasploit)
Stars: ✭ 142 (-79.27%)
Mutual labels:  metasploit
presentations
My Presentations in PDF
Stars: ✭ 27 (-96.06%)
Mutual labels:  metasploit
Metasploit Cheat Sheet
Metasploit Cheat Sheet 💣
Stars: ✭ 139 (-79.71%)
Mutual labels:  metasploit
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (-60.29%)
Mutual labels:  metasploit
RC-exploiter
NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
Stars: ✭ 50 (-92.7%)
Mutual labels:  metasploit
Easy hack
Hack the World using Termux
Stars: ✭ 549 (-19.85%)
Mutual labels:  metasploit
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (-23.07%)
Mutual labels:  metasploit
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-43.5%)
Mutual labels:  metasploit
Shellver
Reverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-62.34%)
Mutual labels:  metasploit
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (-83.21%)
Mutual labels:  metasploit
1-60 of 77 similar projects