Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation redteaming
exploitation
x
redteaming
x
5 search results found
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Penetration Testing Tools
⭐
2,393
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
Security List
⭐
1,181
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Malleable C2 Profiles
⭐
193
Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
Sh4d0wup
⭐
116
Signing-key abuse and update exploitation framework
Cve 2022 23808
⭐
110
phpMyAdmin XSS
Kernel Mii
⭐
69
Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.
Pentest Bookmarkz
⭐
67
A collection of useful links for Pentesters
G3nius Tools Sploit
⭐
53
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Amd Ryzen Master Driver V17 Exploit
⭐
41
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
Redteam
⭐
41
One line PS scripts that may come handy during your network assesment
Pyfud
⭐
36
CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)
Cmstplua Uac Bypass
⭐
16
Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.
Arducky
⭐
12
Arducky - Arduino Ducky Script Interpreter
Hacking Utilidades
⭐
9
Utilidades para facilitarnos el trabajo
Beryl
⭐
6
initial access payload injector through uac PE bypass windows defender
Related Searches
Python Exploitation (1,622)
Exploitation Cve (771)
Vulnerabilities Exploitation (660)
C Exploitation (545)
Exploitation Penetration Testing (383)
1-5 of 5 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.