Awesome OscpA curated list of awesome OSCP resources
Stars: ✭ 804 (-73.12%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-93.61%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-84.99%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-94.58%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-86.02%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-98.86%)
certexfilExfiltration based on custom X509 certificates
Stars: ✭ 18 (-99.4%)
Oscp PwkThis is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Stars: ✭ 406 (-86.43%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-97.06%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-98.4%)
VhostscanA virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (-74.36%)
GopherC# tool to discover low hanging fruits
Stars: ✭ 73 (-97.56%)
ShellyAutomatic Reverse Shell Generator
Stars: ✭ 38 (-98.73%)
RedTeamOne line PS scripts that may come handy during your network assesment
Stars: ✭ 56 (-98.13%)
BettercapThe Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+258.91%)
php-reverse-shellPHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (-90.84%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-98.96%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-98.46%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-99.53%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-98.8%)
Buffer overflowDon't let buffer overflows overflow your mind
Stars: ✭ 131 (-95.62%)
AggressorScriptsA collection of Cobalt Strike aggressor scripts
Stars: ✭ 18 (-99.4%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-97.09%)
Pwk Oscp Preparation RoadmapRoadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (-95.25%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (-74.09%)
ReconnoitreA security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (-39.02%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-97.36%)
atermIt records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-99.43%)
ThecollectiveThe Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-97.16%)
Zynix Fusionzynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-97.19%)
RaccoonA high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (-22.7%)
AzureCLI-ExtractorA tool to extract and abuse access tokens from AzureCLI for bypassing 2FA/MFA.
Stars: ✭ 43 (-98.56%)
Pathwar☠️ The Pathwar Project ☠️
Stars: ✭ 58 (-98.06%)
Pentest⛔️ offsec batteries included
Stars: ✭ 1,063 (-64.46%)
OscpMy OSCP journey
Stars: ✭ 50 (-98.33%)
crimson-sprayA lockout aware password sprayer
Stars: ✭ 11 (-99.63%)
KeyloggerGet Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (-79.81%)
NativePayload CBTNativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)
Stars: ✭ 109 (-96.36%)
NosqlmapAutomated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (-35.54%)
BlackmambaC2/post-exploitation framework
Stars: ✭ 544 (-81.81%)
shellbackReverse shell generator
Stars: ✭ 22 (-99.26%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-81.91%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-84.52%)