All Projects → Msf Auxiliarys → Similar Projects or Alternatives

149 Open source projects that are alternatives of or similar to Msf Auxiliarys

Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+5.46%)
Mutual labels:  post-exploitation, metasploit
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+393.99%)
Mutual labels:  post-exploitation, metasploit
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+1.64%)
Mutual labels:  post-exploitation, metasploit
presentations
My Presentations in PDF
Stars: ✭ 27 (-85.25%)
Mutual labels:  post-exploitation, metasploit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-22.4%)
Mutual labels:  post-exploitation, metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+228.42%)
Mutual labels:  post-exploitation, metasploit
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+161.2%)
Mutual labels:  post-exploitation, metasploit
Msf Venom Cheatsheet
Single Page Cheatsheet for common MSF Venom One Liners
Stars: ✭ 81 (-55.74%)
Mutual labels:  metasploit
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-31.15%)
Mutual labels:  metasploit
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-62.84%)
Mutual labels:  post-exploitation
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-83.61%)
Mutual labels:  post-exploitation
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+592.9%)
Mutual labels:  post-exploitation
Penta
Open source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-28.96%)
Mutual labels:  metasploit
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+549.18%)
Mutual labels:  post-exploitation
Scrun
BypassAV ShellCode Loader (Cobaltstrike/Metasploit)
Stars: ✭ 142 (-22.4%)
Mutual labels:  metasploit
Decryptrdcmanager
.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-67.76%)
Mutual labels:  post-exploitation
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-31.69%)
Mutual labels:  metasploit
Zombieant
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Stars: ✭ 169 (-7.65%)
Mutual labels:  post-exploitation
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+362.84%)
Mutual labels:  metasploit
Metasploit Cheat Sheet
Metasploit Cheat Sheet 💣
Stars: ✭ 139 (-24.04%)
Mutual labels:  metasploit
Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-38.8%)
Mutual labels:  post-exploitation
Fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+3847.54%)
Mutual labels:  post-exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4136.07%)
Mutual labels:  post-exploitation
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-40.98%)
Mutual labels:  post-exploitation
Byob
An open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+3697.27%)
Mutual labels:  post-exploitation
Bashark
Bash post exploitation toolkit
Stars: ✭ 602 (+228.96%)
Mutual labels:  post-exploitation
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-52.46%)
Mutual labels:  post-exploitation
Evasor
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Stars: ✭ 134 (-26.78%)
Mutual labels:  post-exploitation
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+587.98%)
Mutual labels:  metasploit
Sillyrat
A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
Stars: ✭ 152 (-16.94%)
Mutual labels:  metasploit
Winpayloads
Undetectable Windows Payload Generation
Stars: ✭ 1,211 (+561.75%)
Mutual labels:  metasploit
Backdoor Apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
Stars: ✭ 1,766 (+865.03%)
Mutual labels:  metasploit
Findsploit
Find exploits in local and online databases instantly
Stars: ✭ 1,160 (+533.88%)
Mutual labels:  metasploit
Fido
Teaching old shellcode new tricks
Stars: ✭ 169 (-7.65%)
Mutual labels:  metasploit
Intersect 2.5
Post-Exploitation Framework
Stars: ✭ 59 (-67.76%)
Mutual labels:  post-exploitation
Silenttrinity
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+865.57%)
Mutual labels:  post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+442.08%)
Mutual labels:  post-exploitation
Sec Tools
Docker images for infosec tools
Stars: ✭ 135 (-26.23%)
Mutual labels:  metasploit
Autopwn
A simple bash based metasploit automation tool!
Stars: ✭ 99 (-45.9%)
Mutual labels:  metasploit
Easy hack
Hack the World using Termux
Stars: ✭ 549 (+200%)
Mutual labels:  metasploit
Metasploit Modules
Various Metasploit Modules
Stars: ✭ 12 (-93.44%)
Mutual labels:  metasploit
Msploitego
Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-32.24%)
Mutual labels:  metasploit
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-1.64%)
Mutual labels:  metasploit
Msfpc
MSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (+341.53%)
Mutual labels:  metasploit
Postexploits
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-39.34%)
Mutual labels:  post-exploitation
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+3581.42%)
Mutual labels:  post-exploitation
Herakeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-24.59%)
Mutual labels:  post-exploitation
Morpheus
Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)
Stars: ✭ 685 (+274.32%)
Mutual labels:  metasploit
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-41.53%)
Mutual labels:  post-exploitation
Pyexfil
A Python Package for Data Exfiltration
Stars: ✭ 554 (+202.73%)
Mutual labels:  post-exploitation
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-8.74%)
Mutual labels:  post-exploitation
Redcloud
Automated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+201.09%)
Mutual labels:  metasploit
Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+602.73%)
Mutual labels:  metasploit
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+197.27%)
Mutual labels:  post-exploitation
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+187.98%)
Mutual labels:  metasploit
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+897.81%)
Mutual labels:  post-exploitation
Devil
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Stars: ✭ 88 (-51.91%)
Mutual labels:  metasploit
Viper
metasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+166.12%)
Mutual labels:  post-exploitation
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-52.46%)
Mutual labels:  post-exploitation
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+1402.73%)
Mutual labels:  metasploit
1-60 of 149 similar projects