Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for post exploitation
post-exploitation
x
145 search results found
Uzi
⭐
25
A Distinctive Ransomeware.
Dfex
⭐
23
DNS File EXfiltration
Androidhack_backdoor
⭐
21
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Decryptrdcmanager
⭐
21
.NET 4.0 Remote Desktop Manager Password Gatherer
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Magikindex
⭐
20
Advanced Keylogger / Info Grabber written in C++.
Tokenplayer
⭐
20
Manipulating and Abusing Windows Access Tokens.
Crowbar
⭐
19
A windows post exploitation tool that contains a lot of features for information gathering and more.
Ttps
⭐
17
Tactics, Techniques, and Procedures
Apollo
⭐
16
A simple, lightweight Remote Access Tool written in Python
Soapy
⭐
16
log file scrubber
Lolspoof
⭐
16
An interactive shell to spoof some LOLBins command line
Metasploit Tutorial
⭐
15
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
Morc
⭐
15
mOrc is a post-exploitation framework for macOS written in Bash
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
Burn
⭐
14
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
C2_server
⭐
14
C2 server to connect to a victim machine via reverse shell
Jsbot
⭐
13
A javascript based botnet/C&C to remotely manage/control browsers.
Chrome_enum
⭐
13
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Fetters
⭐
12
Port of Seatbelt in F#
Mythic Crate
⭐
12
⚔️ 📦 An Ubuntu 18.04 box for Mythic C2 framework development
Sbd
⭐
12
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Arducky
⭐
12
Arducky - Arduino Ducky Script Interpreter
Ntlmx
⭐
12
Post-exploitation NTLM password hash extractor
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Shellord
⭐
11
ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java
Apollo
⭐
11
A simple, lightweight Remote Access Tool written in Python
Ed
⭐
10
Ed is a tool used to identify and exploit accessible UNIX Domain Sockets
Postex Tools
⭐
10
A set of libraries and accompanying tools for post-exploitation, written in Golang.
0hw3ll
⭐
9
Env Scraper for Linux Post Exploitation
Packetanalyzerandsniffer
⭐
9
A simple python module that implements a packet sniffer and analyser. It sniffs and analyses TCP, UDP, IPV4 and IPV6 traffic.
C_keylogger
⭐
8
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
Alticha Voucher_swap Razmashat Rootkit Voucher_swap
⭐
8
This combines Alticha-voucher_swap + Razmashat-RootKit-voucher_swap to get a FileManager on A12
Awesome Command Control
⭐
7
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments.
Urchin
⭐
7
🐚💥 Python socket remote shell that lets you connect to others computers through the shell when they run the client.
The Complete Metasploit Guide
⭐
7
Explore effective penetration testing techniques with Metasploit
Dartrs
⭐
6
portable dart based reverse shell
Cannon
⭐
6
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
Hermit
⭐
5
A post-exploitation, command and control framework written in Rust.
Sharpwatchdogs
⭐
5
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
Advanced Penetration Testing
⭐
5
A Step by Step Penetration Testing Sheet for Cyber Security Experts
Katanaframework
⭐
5
Katana-Framework это фреймворк для энтузиастов по тестированию на проникновение на данный момент еще находится в разработке.
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
Foster
⭐
5
Demo for spawning processes under a specified parent PID.
Fingerprinting Envio Ftp
⭐
5
Post-explotación. Bypass ExecutionPolicy Powershell - Fingerprinting y envío de información a un servidor FTP
101-145 of 145 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.