Peh

Alternatives To Peh
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Phpsploit2,000
7 months ago28gpl-3.0Python
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Torat907
a year ago2November 05, 201914unlicenseGo
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Gtfonow414
2 months ago3mitPython
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Windows Post Exploitation324
3 years ago
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Awesome Cyber Security255
4 years agon,ull
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Hatsploit236
3 months agomitPython
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Leprechaun236
2 years agomitRuby
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Gtfo76
3 years ago1gpl-3.0Python
Search for Unix binaries that can be exploited to bypass system security restrictions.
Forceadmin53
7 months agogpl-3.0AutoIt
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Peh37
a year agoPowerShell
Post exploitation helper
Alternatives To Peh
Select To Compare


Alternative Project Comparisons
Popular Post Exploitation Projects
Popular Privilege Escalation Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Powershell
Privilege Escalation
Post Exploitation