Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c post exploitation
c
x
post-exploitation
x
11 search results found
Mimipenguin
⭐
3,290
A tool to dump the login password from the current linux user
Post Exploitation
⭐
1,264
Post Exploitation Collection
Windowspy
⭐
234
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Offensiveph
⭐
228
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
Enumy
⭐
181
Linux post exploitation privilege escalation enumeration
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Zombieant
⭐
149
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Sudo_sniff
⭐
36
Steal user's password when running sudo for post-exploitation purposes
Alticha Voucher_swap Razmashat Rootkit Voucher_swap
⭐
8
This combines Alticha-voucher_swap + Razmashat-RootKit-voucher_swap to get a FileManager on A12
C_keylogger
⭐
8
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
Related Searches
C Kernel (12,841)
C Video Game (4,242)
C Driver (4,121)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.