Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity post exploitation
cybersecurity
x
post-exploitation
x
8 search results found
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Awesome Malware
⭐
118
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Awesome Cyber
⭐
65
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Bof Launcher
⭐
31
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Magikindex
⭐
20
Advanced Keylogger / Info Grabber written in C++.
Metasploit Tutorial
⭐
15
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
Chrome_enum
⭐
13
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Related Searches
Python Cybersecurity (756)
Security Cybersecurity (484)
Cybersecurity Information Security (226)
1-8 of 8 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.