All Projects → Postexploits → Similar Projects or Alternatives

160 Open source projects that are alternatives of or similar to Postexploits

Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+273.87%)
Mutual labels:  post-exploitation, keylogger
Herakeylogger
Chrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (+24.32%)
Mutual labels:  post-exploitation, keylogger
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+275.68%)
Mutual labels:  keylogger, post-exploitation
Pyexfil
A Python Package for Data Exfiltration
Stars: ✭ 554 (+399.1%)
Mutual labels:  post-exploitation
Wpforce
Wordpress Attack Suite
Stars: ✭ 633 (+470.27%)
Mutual labels:  keylogger
Intersect 2.5
Post-Exploitation Framework
Stars: ✭ 59 (-46.85%)
Mutual labels:  post-exploitation
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-21.62%)
Mutual labels:  post-exploitation
Viper
metasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+338.74%)
Mutual labels:  post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+793.69%)
Mutual labels:  post-exploitation
Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+5332.43%)
Mutual labels:  post-exploitation
Mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+290.09%)
Mutual labels:  post-exploitation
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+5969.37%)
Mutual labels:  post-exploitation
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-44.14%)
Mutual labels:  keylogger
Beelogger
Generate Gmail Emailing Keyloggers to Windows.
Stars: ✭ 605 (+445.05%)
Mutual labels:  keylogger
Archivist
A ctypes powered python keylogger.
Stars: ✭ 92 (-17.12%)
Mutual labels:  keylogger
Blackmamba
C2/post-exploitation framework
Stars: ✭ 544 (+390.09%)
Mutual labels:  post-exploitation
Cornerstone
Linux命令转发记录
Stars: ✭ 51 (-54.05%)
Mutual labels:  keylogger
Radium
Python logger with multiple features.
Stars: ✭ 492 (+343.24%)
Mutual labels:  keylogger
Keylogger
🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-12.61%)
Mutual labels:  keylogger
Rat Via Telegram
Windows Remote Administration Tool via Telegram
Stars: ✭ 453 (+308.11%)
Mutual labels:  keylogger
Pylogger
🐍 A Python Keylogger for Windows
Stars: ✭ 36 (-67.57%)
Mutual labels:  keylogger
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1042.34%)
Mutual labels:  post-exploitation
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+281.98%)
Mutual labels:  keylogger
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-71.17%)
Mutual labels:  keylogger
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+277.48%)
Mutual labels:  post-exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+263.06%)
Mutual labels:  post-exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+6883.78%)
Mutual labels:  post-exploitation
Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-42.34%)
Mutual labels:  keylogger
Byob
An open-source post-exploitation framework for students, researchers and developers.
Stars: ✭ 6,949 (+6160.36%)
Mutual labels:  post-exploitation
Spykeyboard
keylogger which sends us the data to our gmail.
Stars: ✭ 95 (-14.41%)
Mutual labels:  keylogger
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+444.14%)
Mutual labels:  keylogger
Blazerat
🔥 Control your Linux home computer with telegram bot.
Stars: ✭ 60 (-45.95%)
Mutual labels:  keylogger
Bashark
Bash post exploitation toolkit
Stars: ✭ 602 (+442.34%)
Mutual labels:  post-exploitation
Cromos
Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
Stars: ✭ 103 (-7.21%)
Mutual labels:  keylogger
Spy
👀 Linux kernel mode debugfs keylogger
Stars: ✭ 546 (+391.89%)
Mutual labels:  keylogger
Decryptrdcmanager
.NET 4.0 Remote Desktop Manager Password Gatherer
Stars: ✭ 59 (-46.85%)
Mutual labels:  post-exploitation
Saint
👁 (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]
Stars: ✭ 522 (+370.27%)
Mutual labels:  keylogger
Keylogger
A powerful C keylogger for Windows.
Stars: ✭ 89 (-19.82%)
Mutual labels:  keylogger
Logkeys
📝 ⌨️ A GNU/Linux keylogger that works!
Stars: ✭ 518 (+366.67%)
Mutual labels:  keylogger
Keylogger
A simple keylogger for Windows, Linux and Mac
Stars: ✭ 1,007 (+807.21%)
Mutual labels:  keylogger
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+330.63%)
Mutual labels:  post-exploitation
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-3.6%)
Mutual labels:  post-exploitation
Go Shellcode
Load shellcode into a new process
Stars: ✭ 456 (+310.81%)
Mutual labels:  post-exploitation
Swift Keylogger
Keylogger for mac written in Swift using HID
Stars: ✭ 995 (+796.4%)
Mutual labels:  keylogger
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+288.29%)
Mutual labels:  keylogger
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-21.62%)
Mutual labels:  post-exploitation
Powerhub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Stars: ✭ 431 (+288.29%)
Mutual labels:  post-exploitation
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-71.17%)
Mutual labels:  keylogger
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (+281.98%)
Mutual labels:  post-exploitation
Rat Hodin V2.9
Remote Administration Tool for Linux
Stars: ✭ 97 (-12.61%)
Mutual labels:  keylogger
Skyrat
SkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-81.08%)
Mutual labels:  keylogger
Keylogger
A no-frills keylogger for Mac OS X.
Stars: ✭ 372 (+235.14%)
Mutual labels:  keylogger
Pxenum
A shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-72.97%)
Mutual labels:  post-exploitation
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+255.86%)
Mutual labels:  keylogger
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+970.27%)
Mutual labels:  post-exploitation
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+218.92%)
Mutual labels:  post-exploitation
Venom
venom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+714.41%)
Mutual labels:  post-exploitation
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-2.7%)
Mutual labels:  post-exploitation
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-5.41%)
Mutual labels:  keylogger
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-12.61%)
Mutual labels:  keylogger
1-60 of 160 similar projects