Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for hacking tool redteam tools
hacking-tool
x
redteam-tools
x
14 search results found
Yakit
⭐
5,790
Cyber Security ALL-IN-ONE Platform
Villain
⭐
3,376
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
Dome
⭐
412
Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports.
Nebula
⭐
291
AI-Powered Ethical Hacking Assistant
Sharpgmailc2
⭐
219
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Wwwtree
⭐
146
A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.
Skanuvaty
⭐
140
Dangerously fast DNS/network/port scanner
Turbo Attack
⭐
87
A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
Upnproxychain
⭐
40
A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).
Attacksurfacemanagement
⭐
33
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Catspin
⭐
29
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
Ddwpasterecon
⭐
22
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can collect and analyse data from these indexed pastesites to better protect against unknown threats.
Jasmin Ransomware
⭐
14
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Mavoc
⭐
12
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
Cstorm Windows Startup Virus In C
⭐
9
An opensource Prank Startup Malware for windows developed using C Programming Language.
Stealthlink
⭐
9
With StealthLink, you can easily create a convincing mask for your phishing URLs, making them indistinguishable from legitimate websites. This tool is designed to provide a professional-level of obfuscation to any phishing URL, making it virtually impossible for users to detect.
Githarvest3r
⭐
7
Simple CVE github exploit gathering tool written in python.
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Python Hacking Tool (547)
Penetration Testing Hacking Tool (286)
Shell Hacking Tool (183)
Security Hacking Tool (130)
Hack Hacking Tool (107)
Security Tools Hacking Tool (93)
Red Team Redteam Tools (80)
Cybersecurity Hacking Tool (78)
1-14 of 14 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.