Gtfobins.github.ioGTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+1138.19%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-82.14%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (-14.17%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (-13.96%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+143.94%)
gtfoSearch for Unix binaries that can be exploited to bypass system security restrictions.
Stars: ✭ 88 (-81.93%)
Fudgec2FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (-60.78%)
PivotsuiteNetwork Pivoting Toolkit
Stars: ✭ 329 (-32.44%)
Go ShellcodeLoad shellcode into a new process
Stars: ✭ 456 (-6.37%)
Dns PersistDNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (-60.78%)
redpillAssist reverse tcp shells in post-exploration tasks
Stars: ✭ 142 (-70.84%)
OrcOrc is a post-exploitation framework for Linux written in Bash
Stars: ✭ 349 (-28.34%)
FoureyeAV Evasion Tool For Red Team Ops
Stars: ✭ 421 (-13.55%)
Redteam ResearchCollection of PoC and offensive techniques used by the BlackArrow Red Team
Stars: ✭ 330 (-32.24%)
Prusti DevA static verifier for Rust, based on the Viper verification infrastructure.
Stars: ✭ 302 (-37.99%)
EhtoolsWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-13.35%)
Gray hat csharp codeThis repository contains full code examples from the book Gray Hat C#
Stars: ✭ 301 (-38.19%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+623.2%)
0xsp Mongoosea unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.
Stars: ✭ 419 (-13.96%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (-39.22%)
LolbasLiving Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stars: ✭ 3,810 (+682.34%)
KoanfLight weight, extensible configuration management library for Go. Built in support for JSON, TOML, YAML, env, command line, file, S3 etc. Alternative to viper.
Stars: ✭ 450 (-7.6%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (-17.25%)
Cobalt strike extension kitAttempting to be an all in one repo for others' userful aggressor scripts as well as things we've found useful during Red Team Operations.
Stars: ✭ 345 (-29.16%)
Wadcoms.github.ioWADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (-11.5%)
TtpsTactics, Techniques, and Procedures
Stars: ✭ 335 (-31.21%)
OverlordOverlord - Red Teaming Infrastructure Automation
Stars: ✭ 258 (-47.02%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (-12.94%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+2.46%)
ViperViper 是一个基于Anno微服务引擎开发的Dashboard项目、示例项目。Anno 底层通讯采用 grpc、thrift。自带服务发现、调用链追踪、Cron 调度、限流、事件总线等等
Stars: ✭ 402 (-17.45%)
FatratFatrat -A cloud based Remote Android Managment Suite, Powered by NodeJS
Stars: ✭ 31 (-93.63%)
OctopusOpen source pre-operation C2 server based on python and powershell
Stars: ✭ 449 (-7.8%)
MimipenguinA tool to dump the login password from the current linux user
Stars: ✭ 3,151 (+547.02%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (-14.78%)
CloudbruteAwesome cloud enumerator
Stars: ✭ 268 (-44.97%)
SlackpirateSlack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Stars: ✭ 512 (+5.13%)
Flawless IosAwesome iOS guides from the community, shared on Flawless iOS Medium blog 👉
Stars: ✭ 260 (-46.61%)
ViperitViper Framework for iOS using Swift
Stars: ✭ 404 (-17.04%)
HershellHershell is a simple TCP reverse shell written in Go.
Stars: ✭ 442 (-9.24%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-21.56%)
MicrosoftWontFixListA list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. This list covers only vulnerabilities that came up in July 2021 (and SpoolSample ;-))
Stars: ✭ 854 (+75.36%)
MHNetworkSay goodbye to the Fat ugly singleton Network Manager with this Network Layer
Stars: ✭ 16 (-96.71%)
BadAssMacrosBadAssMacros - C# based automated Malicous Macro Generator.
Stars: ✭ 281 (-42.3%)
Repo SupervisorScan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (-1.03%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-10.68%)
KithackHacking tools pack & backdoors generator.
Stars: ✭ 377 (-22.59%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-90.14%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (-11.09%)
Pidense🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
Stars: ✭ 358 (-26.49%)
vercorsThe VerCors verification toolset for verifying parallel and concurrent software
Stars: ✭ 30 (-93.84%)