PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+736.62%)
Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+4146.48%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+34.51%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (+221.13%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-38.03%)
Vipermetasploit-framework 图形界面 / 图形化内网渗透工具
Stars: ✭ 487 (+242.96%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (+131.69%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-38.73%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+194.37%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+195.07%)
Dns PersistDNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (+34.51%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-78.17%)
PowerShell-LumosA PowerShell module for automatic switching between light and dark themes
Stars: ✭ 17 (-88.03%)
MacOS-WPA-PSKPoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Stars: ✭ 29 (-79.58%)
365-Stealer365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.
Stars: ✭ 200 (+40.85%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+173.24%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (-10.56%)
nTimetoolsTimestomper and Timestamp checker with nanosecond accuracy for NTFS volumes
Stars: ✭ 25 (-82.39%)
rpc2socksPost-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (-11.27%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 601 (+323.24%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-79.58%)
fileless-elf-execExecute ELF files without dropping them on disk
Stars: ✭ 237 (+66.9%)
ReverseShellDllC++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked
Stars: ✭ 69 (-51.41%)
KnockOutlookA little tool to play with Outlook
Stars: ✭ 188 (+32.39%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-73.24%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+2516.2%)
TfsCmdletsPowerShell Cmdlets for Azure DevOps and Team Foundation Server
Stars: ✭ 75 (-47.18%)
ConstoleScan for and exploit Consul agents
Stars: ✭ 37 (-73.94%)
HellgateLoader CSharpLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-48.59%)
sudo sniffSteal user's password when running sudo for post-exploitation purposes
Stars: ✭ 26 (-81.69%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-84.51%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-81.69%)
PS OPNsensePowerShell Module for OPNsense REST api
Stars: ✭ 27 (-80.99%)
BackToMeLittle tool made in python to create payloads for Linux, Windows and OSX with unique handler
Stars: ✭ 61 (-57.04%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+10.56%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-73.24%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-44.37%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+473.94%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-90.85%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-66.9%)
sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (-63.38%)
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-83.8%)
SLibSLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (-64.79%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (-48.59%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-73.94%)
dummyDLLUtility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (-75.35%)
AdbNetA tool that allows you to search for vulnerable android devices across the world and exploit them.
Stars: ✭ 112 (-21.13%)
brutasWordlists and passwords handcrafted with ♥
Stars: ✭ 32 (-77.46%)
RedBook基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-60.56%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-90.14%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-73.24%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-46.48%)