Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for metasploit post exploitation
metasploit
x
post-exploitation
x
12 search results found
Viper
⭐
3,385
Redteam operation platform with webui 图形化红队行动辅助平台
Venom
⭐
1,403
venom - C2 shellcode generator/compiler/handler
Post Exploitation
⭐
1,264
Post Exploitation Collection
Vegile
⭐
694
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Hrshell
⭐
242
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Msf Auxiliarys
⭐
177
My collection of metasploit auxiliary post-modules
Boomer
⭐
71
Framework for exploiting local vulnerabilities
Uzi
⭐
25
A Distinctive Ransomeware.
Metasploit Tutorial
⭐
15
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
The Complete Metasploit Guide
⭐
7
Explore effective penetration testing techniques with Metasploit
Katanaframework
⭐
5
Katana-Framework это фреймворк для энтузиастов по тестированию на проникновение на данный момент еще находится в разработке.
1-12 of 12 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.