Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for penetration testing post exploitation
penetration-testing
x
post-exploitation
x
13 search results found
Hacker Roadmap
⭐
12,086
A collection of hacking tools, resources and references to practice ethical hacking.
Pupy
⭐
7,889
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Evilosx
⭐
2,115
An evil RAT (Remote Administration Tool) for macOS / OS X.
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Blackmamba
⭐
688
C2/post-exploitation framework
Powerhub
⭐
680
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Psmapexec
⭐
549
A PowerShell tool that takes strong inspiration from CrackMapExec.
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Covertutils
⭐
412
A framework for Backdoor development!
Offensiveautoit
⭐
323
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Pyiris
⭐
308
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hrshell
⭐
242
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Covermyass
⭐
227
Post-exploitation tool to cover your tracks on a compromised machine
Enumdb
⭐
215
Relational database brute force and post exploitation tool for MySQL and MSSQL
Dns Persist
⭐
211
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Poet
⭐
185
[unmaintained] Post-exploitation tool
Bella
⭐
179
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Xena
⭐
175
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit.
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Sec Pentesting Toolkit
⭐
130
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Intersect 2.5
⭐
58
Post-Exploitation Framework
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Forceadmin
⭐
53
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
Backtome
⭐
50
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
C2pe
⭐
34
C2 and Post Exploitation Code
Adbnet
⭐
32
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Ipwn
⭐
28
A Framework meant for the exploitation of iOS devices.
Deathnote
⭐
26
🔥 Pentest Cheat Sheet
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Crowbar
⭐
19
A windows post exploitation tool that contains a lot of features for information gathering and more.
Ttps
⭐
17
Tactics, Techniques, and Procedures
Metasploit Tutorial
⭐
15
👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.
Burn
⭐
14
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Arducky
⭐
12
Arducky - Arduino Ducky Script Interpreter
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Packetanalyzerandsniffer
⭐
9
A simple python module that implements a packet sniffer and analyser. It sniffs and analyses TCP, UDP, IPV4 and IPV6 traffic.
Katanaframework
⭐
5
Katana-Framework это фреймворк для энтузиастов по тестированию на проникновение на данный момент еще находится в разработке.
Advanced Penetration Testing
⭐
5
A Step by Step Penetration Testing Sheet for Cyber Security Experts
Related Searches
Python Penetration Testing (1,306)
Security Penetration Testing (723)
Shell Penetration Testing (433)
Scanner Penetration Testing (374)
Penetration Testing Hacking Tool (364)
Exploitation Penetration Testing (347)
Penetration Testing Red Team (297)
Penetration Testing Information Security (285)
Vulnerabilities Penetration Testing (231)
Golang Penetration Testing (199)
1-13 of 13 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.