Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for post exploitation
post-exploitation
x
145 search results found
Hacker Roadmap
⭐
12,773
A collection of hacking tools, resources and references to practice ethical hacking.
Fsociety
⭐
10,082
fsociety Hacking Tools Pack – A Penetration Testing Framework
Byob
⭐
8,681
An open-source post-exploitation framework for students, researchers and developers.
Pupy
⭐
7,889
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Merlin
⭐
4,930
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Viper
⭐
3,385
Redteam operation platform with webui 图形化红队行动辅助平台
Mimipenguin
⭐
3,290
A tool to dump the login password from the current linux user
Ghost
⭐
2,400
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Evilosx
⭐
2,115
An evil RAT (Remote Administration Tool) for macOS / OS X.
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Venom
⭐
1,403
venom - C2 shellcode generator/compiler/handler
Post Exploitation
⭐
1,264
Post Exploitation Collection
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Torat
⭐
907
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Pyexfil
⭐
736
A Python Package for Data Exfiltration
Bashark
⭐
712
Bash post exploitation toolkit
Vegile
⭐
701
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Blackmamba
⭐
688
C2/post-exploitation framework
Powerhub
⭐
680
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Teardroid Phprat
⭐
658
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Psmapexec
⭐
549
A PowerShell tool that takes strong inspiration from CrackMapExec.
Go Shellcode
⭐
504
Load shellcode into a new process
Kubesploit
⭐
501
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Heroinn
⭐
446
A cross platform C2/post-exploitation framework.
Alanframework
⭐
435
A C2 post-exploitation framework
Pivotsuite
⭐
423
Network Pivoting Toolkit
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Covertutils
⭐
412
A framework for Backdoor development!
Forensia
⭐
377
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Swap_digger
⭐
376
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Orc
⭐
357
Orc is a post-exploitation framework for Linux written in Bash
Adbwebkit
⭐
351
ADB For Hackers (:
Pth Toolkit
⭐
348
Modified version of the passing-the-hash tool collection made to work straight out of the box
Mssqlproxy
⭐
329
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Pyiris
⭐
328
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Windows Post Exploitation
⭐
324
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Offensiveautoit
⭐
323
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
Awesome Cyber Security
⭐
255
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
Extractbitlockerkeys
⭐
254
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hrshell
⭐
249
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Leprechaun
⭐
236
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Windowspy
⭐
234
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Offensiveph
⭐
228
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
Covermyass
⭐
227
Post-exploitation tool to cover your tracks on a compromised machine
Enumdb
⭐
215
Relational database brute force and post exploitation tool for MySQL and MSSQL
Herakeylogger
⭐
214
Chrome Keylogger Extension | Post Exploitation Tool
Dns Persist
⭐
211
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Sshimpanzee
⭐
211
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Redpill
⭐
202
Assist reverse tcp shells in post-exploration tasks
Bella
⭐
185
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Poet
⭐
185
[unmaintained] Post-exploitation tool
Enumy
⭐
181
Linux post exploitation privilege escalation enumeration
Msf Auxiliarys
⭐
177
My collection of metasploit auxiliary post-modules
Xena
⭐
175
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit.
Scavenger
⭐
173
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Zombieant
⭐
149
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Sec Pentesting Toolkit
⭐
136
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
Atlasc2
⭐
125
C# C2 Framework centered around Stage 1 operations
Awesome Malware
⭐
118
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Javapayload
⭐
103
JavaPayload is a collection of pure Java payloads to be used for post-exploitation from pure Java exploits or from common misconfigurations (like not password protected Tomcat manager or debugger port).
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Pythonrat
⭐
92
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Rpc2socks
⭐
91
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Evasor
⭐
76
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Jawfish
⭐
72
Tool for breaking into web applications.
Boomer
⭐
71
Framework for exploiting local vulnerabilities
Awesome Cyber
⭐
65
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Intersect 2.5
⭐
58
Post-Exploitation Framework
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Venus
⭐
53
A Visual Studio Code Extension agent for Mythic C2
Forceadmin
⭐
53
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
Backtome
⭐
50
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Ldap Credentials Collector Backdoor Generator
⭐
50
This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
Shennina
⭐
46
Automating Host Exploitation with AI
Peh
⭐
37
Post exploitation helper
Linpwn
⭐
36
Interactive Post Exploitation Tool
Sudo_sniff
⭐
36
Steal user's password when running sudo for post-exploitation purposes
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
C2pe
⭐
34
C2 and Post Exploitation Code
Pxenum
⭐
32
A shell script that automatically performs a series of *NIX enumeration tasks.
Adbnet
⭐
32
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Aws Attack
⭐
32
AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, Pacu.
Bof Launcher
⭐
31
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Macos Wpa Psk
⭐
30
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Ipwn
⭐
28
A Framework meant for the exploitation of iOS devices.
Longtime Sunshine
⭐
28
Nashorn Post Exploitation
Deathnote
⭐
26
🔥 Pentest Cheat Sheet
1-100 of 145 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.