trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-85.25%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+321.64%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-80%)
PakuriPenetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-59.02%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-71.48%)
AutopwnA simple bash based metasploit automation tool!
Stars: ✭ 99 (-67.54%)
Hackers Tool KitIts a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (-30.82%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-58.69%)
MouseMouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-39.02%)
AutosploitAutomated Mass Exploiter
Stars: ✭ 4,500 (+1375.41%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-53.44%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-75.41%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+72.46%)
TechnowhorseTechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Stars: ✭ 189 (-38.03%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+25.25%)
PupyPupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+2108.85%)
MsfpcMSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (+164.92%)
HackapkAn Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-40.98%)
ArcanusARCANUS is a customized payload generator/handler.
Stars: ✭ 130 (-57.38%)
CnC-detectionDetecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation
Stars: ✭ 15 (-95.08%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-87.87%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+27.21%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-1.31%)
trackingA geospatial tracking service with Go and Redis
Stars: ✭ 34 (-88.85%)
Dynamitey(pronounced dyna-mighty) flexes DLR muscle to do meta-mazing things in .net
Stars: ✭ 278 (-8.85%)
jsonlintLightweight command-line tool for validating JSON
Stars: ✭ 27 (-91.15%)
Hacker News Digest📰 A responsive interface of Hacker News with summaries and thumbnails.
Stars: ✭ 278 (-8.85%)
SQL-XSSA few SQL and XSS attack tools
Stars: ✭ 29 (-90.49%)
yarasploitYaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-89.84%)
Pubmed parser📋 A Python Parser for PubMed Open-Access XML Subset and MEDLINE XML Dataset
Stars: ✭ 274 (-10.16%)
SwashFonts in iOS made safe, expressive, and dynamic.
Stars: ✭ 73 (-76.07%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-2.95%)
TinkerTinker is a hot-fix solution library for Android, it supports dex, library and resources update without reinstall apk.
Stars: ✭ 16,151 (+5195.41%)
IpnetworkIPNetwork command line and C# library take care of complex network, IP, IPv4, IPv6, netmask, CIDR, subnet, subnetting, supernet, and supernetting calculation for .NET developers. It works with IPv4 as well as IPv6, is written in C#, has a light and clean API, and is fully unit-tested
Stars: ✭ 276 (-9.51%)
RT7-exampleCode for the React Table 7 article
Stars: ✭ 32 (-89.51%)
EgesploitEGESPLOIT is a golang library for malware development
Stars: ✭ 275 (-9.84%)
staekkaStækka Metasploit - Extenting Metasploit
Stars: ✭ 51 (-83.28%)
ip proxy poolGenerating spiders dynamically to crawl and check those free proxy ip on the internet with scrapy.
Stars: ✭ 39 (-87.21%)
FfdynamicLibrary with dynamic audio/video composition and runtime control
Stars: ✭ 274 (-10.16%)
macroCustomize code using closures
Stars: ✭ 135 (-55.74%)
EternalblueEternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-50.82%)
bonaparticleThe LaTeX magazine class that doesn’t get in your way.
Stars: ✭ 20 (-93.44%)
Ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
Stars: ✭ 293 (-3.93%)
Dotnet Fake Json ServerFake JSON Server is a Fake REST API that can be used as a Back End for prototyping or as a template for a CRUD Back End.
Stars: ✭ 265 (-13.11%)
bowser⭐ Bowser - Dynamic Default Browser Switch for MacOS
Stars: ✭ 42 (-86.23%)
Quaternions-RevisitedSample code for a 'Quaternions revisited' article from GPU Pro 5
Stars: ✭ 30 (-90.16%)
ShellverReverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-15.41%)
Log4j-RCE-ScannerRemote command execution vulnerability scanner for Log4j.
Stars: ✭ 200 (-34.43%)