Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for offensive security post exploitation
offensive-security
x
post-exploitation
x
11 search results found
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Blackmamba
⭐
688
C2/post-exploitation framework
Psmapexec
⭐
549
A PowerShell tool that takes strong inspiration from CrackMapExec.
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
C2pe
⭐
34
C2 and Post Exploitation Code
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Ttps
⭐
17
Tactics, Techniques, and Procedures
1-11 of 11 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.